skip to main content
Skip header Section
Introduction to Data Mining, (First Edition)May 2005
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-321-32136-7
Published:01 May 2005
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Piao M, Sheng Y, Yan J and Jin C (2024). Image Hash Layer Triggered CNN Framework for Wafer Map Failure Pattern Retrieval and Classification, ACM Transactions on Knowledge Discovery from Data, 18:4, (1-26), Online publication date: 31-May-2024.
  2. Francia M, Rizzi S and Marcel P (2024). Explaining cube measures through Intentional Analytics, Information Systems, 121:C, Online publication date: 1-Mar-2024.
  3. Hong J, Lee J and Sim M (2024). Concise rule induction algorithm based on one-sided maximum decision tree approach, Expert Systems with Applications: An International Journal, 237:PA, Online publication date: 1-Mar-2024.
  4. Chuang Y and Jhang J (2024). Trustworthy retrieval system in mobile P2P wireless network, Ad Hoc Networks, 154:C, Online publication date: 1-Mar-2024.
  5. Yu J and Do H (2024). Proximity-based density description with regularized reconstruction algorithm for anomaly detection, Information Sciences: an International Journal, 654:C, Online publication date: 1-Jan-2024.
  6. Braik M, Hammouri A, Alzoubi H and Sheta A (2024). Feature Selection based nature inspired Capuchin Search Algorithm for solving classification problems, Expert Systems with Applications: An International Journal, 235:C, Online publication date: 1-Jan-2024.
  7. Lähderanta T, Lovén L, Ruha L, Leppänen T, Launonen I, Riekki J and Sillanpää M (2024). Capacitated spatial clustering with multiple constraints and attributes, Engineering Applications of Artificial Intelligence, 127:PA, Online publication date: 1-Jan-2024.
  8. Zhou S, Duan R, Chen Z and Song W (2024). Weighted ensemble clustering with multivariate randomness and random walk strategy, Applied Soft Computing, 150:C, Online publication date: 1-Jan-2024.
  9. Rahman A, Bose D, Zhang Y and Pandita R (2023). An empirical study of task infections in Ansible scripts, Empirical Software Engineering, 29:1, Online publication date: 1-Jan-2024.
  10. Kuo R, Hsu C, Nguyen T and Tsai C (2024). Hybrid multi-objective metaheuristic and possibilistic intuitionistic fuzzy c-means algorithms for cluster analysis, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 28:2, (991-1008), Online publication date: 1-Jan-2024.
  11. ACM
    Chawthai P, Raphisak P and Katithummarugs S Association Rule Mining for Power Outages Caused by Animals and Vegetation in Electrical Distribution Systems Proceedings of the 13th International Conference on Advances in Information Technology, (1-5)
  12. Jiao L, Yang H, Wang F, Liu Z and Pan Q (2023). DTEC, Pattern Recognition, 144:C, Online publication date: 1-Dec-2023.
  13. E J, He K, Liu H and Ji Q (2023). A novel separation-ensemble analyzing and forecasting method for the gold price forecasting based on RLS-type independent component analysis, Expert Systems with Applications: An International Journal, 232:C, Online publication date: 1-Dec-2023.
  14. Xin X, Liu K, Loughney S, Wang J, Li H and Yang Z (2023). Graph-based ship traffic partitioning for intelligent maritime surveillance in complex port waters, Expert Systems with Applications: An International Journal, 231:C, Online publication date: 30-Nov-2023.
  15. Grissa D, Andonoff E and Hanachi C (2023). Discovering and evaluating organizational knowledge from textual data, Data & Knowledge Engineering, 148:C, Online publication date: 1-Nov-2023.
  16. Liu Y, Chen S, Zhu J and Hu C (2023). Plane-based clustering with asymmetric distribution loss, Applied Soft Computing, 148:C, Online publication date: 1-Nov-2023.
  17. Chuah E, Jhumka A and Narasimhamurthy S (2023). An empirical study of major page faults for failure diagnosis in cluster systems, The Journal of Supercomputing, 79:16, (18445-18479), Online publication date: 1-Nov-2023.
  18. Kaur A, Goyal P, Rajhans R, Agarwal L and Goyal N (2023). Fusion of multivariate time series meteorological and static soil data for multistage crop yield prediction using multi-head self attention network, Expert Systems with Applications: An International Journal, 226:C, Online publication date: 15-Sep-2023.
  19. Marques H, Swersky L, Sander J, Campello R and Zimek A (2023). On the evaluation of outlier detection and one-class classification: a comparative study of algorithms, model selection, and ensembles, Data Mining and Knowledge Discovery, 37:4, (1473-1517), Online publication date: 1-Jul-2023.
  20. De Prisco R, De Santis A, Malandrino D and Zaccagnino R (2023). An improved privacy attack on smartphones exploiting the accelerometer, Journal of Information Security and Applications, 75:C, Online publication date: 1-Jun-2023.
  21. Okkalioglu M (2023). TF-IGM revisited, Expert Systems with Applications: An International Journal, 217:C, Online publication date: 1-May-2023.
  22. Kim T and Lee J (2023). Maximizing AUC to learn weighted naive Bayes for imbalanced data classification, Expert Systems with Applications: An International Journal, 217:C, Online publication date: 1-May-2023.
  23. Yu J and Kang J (2023). Clustering ensemble-based novelty score for outlier detection, Engineering Applications of Artificial Intelligence, 121:C, Online publication date: 1-May-2023.
  24. Yang Z, Chen Y, Sedov D, Kaski S and Corander J (2022). Stochastic cluster embedding, Statistics and Computing, 33:1, Online publication date: 1-Feb-2023.
  25. Djahnit H and Bessedik M (2024). A New Branch and Bound Algorithm for Mining Frequent Conceptual Links in Social Networks, Procedia Computer Science, 225:C, (4399-4409), Online publication date: 1-Jan-2023.
  26. Benedetto I, Sportelli G, Bertoldo S, Tarasconi F, Cagliero L and Giacalone G (2024). On the use of Pretrained Language Models for Legal Italian Document Classification, Procedia Computer Science, 225:C, (2244-2253), Online publication date: 1-Jan-2023.
  27. ACM
    Hloch M, Van Meegen M, Kubek M and Unger H Building term hierarchies using graph-based clustering Proceedings of the 2022 6th International Conference on Natural Language Processing and Information Retrieval, (49-56)
  28. Solarte B, Wu C, Liu Y, Tsai Y and Sun M 360-MLC Proceedings of the 36th International Conference on Neural Information Processing Systems, (6133-6146)
  29. Lu H and Dai Q (2022). A self-supervised COVID-19 CT recognition system with multiple regularizations, Computers in Biology and Medicine, 150:C, Online publication date: 1-Nov-2022.
  30. Min X, Li W, Yang J, Xie W and Zhao D (2022). Dual-level diagnostic feature learning with recurrent neural networks for treatment sequence recommendation, Journal of Biomedical Informatics, 134:C, Online publication date: 1-Oct-2022.
  31. Nanni M, Guidotti R, Bonavita A and Alamdari O (2022). City indicators for geographical transfer learning: an application to crash prediction, Geoinformatica, 26:4, (581-612), Online publication date: 1-Oct-2022.
  32. Li S, Qin D, Wu X, Li J, Li B and Han W (2022). False Alert Detection Based on Deep Learning and Machine Learning, International Journal on Semantic Web & Information Systems, 18:1, (1-21), Online publication date: 26-Aug-2022.
  33. Ngo Q, Kechadi T and Le-Khac N (2022). Knowledge representation in digital agriculture, Computers and Electronics in Agriculture, 199:C, Online publication date: 1-Aug-2022.
  34. Wieczynski J, Lucca G, Borges E, Emmendorfer L, Ferrero-Jaurrieta M, Dimuro G and Bustince H Applying d-XChoquet integrals in classification problems 2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-7)
  35. Berti A, Bernasconi A, Del Corso G and Guidotti R Effect of Different Encodings and Distance Functions on Quantum Instance-Based Classifiers Advances in Knowledge Discovery and Data Mining, (96-108)
  36. Sato‐Ilic M (2022). Cluster‐scaled principal component analysis, WIREs Computational Statistics, 14:3, Online publication date: 12-May-2022.
  37. Keshvari R, Imani M and Parsa Moghaddam M (2022). A clustering-based short-term load forecasting using independent component analysis and multi-scale decomposition transform, The Journal of Supercomputing, 78:6, (7908-7935), Online publication date: 1-Apr-2022.
  38. Rohidin D, Samsudin N and Deris M (2022). Association rules of fuzzy soft set based classification for text classification problem, Journal of King Saud University - Computer and Information Sciences, 34:3, (801-812), Online publication date: 1-Mar-2022.
  39. Hamdi A, Shaban K, Erradi A, Mohamed A, Rumi S and Salim F (2022). Spatiotemporal data mining: a survey on challenges and open problems, Artificial Intelligence Review, 55:2, (1441-1488), Online publication date: 1-Feb-2022.
  40. Iacca G and de Melo V (2022). Cluster-centroid-based mutation strategies for Differential Evolution, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 26:4, (1889-1921), Online publication date: 1-Feb-2022.
  41. Sajid F, Hassan M, Khan A, Rizwan M, Kryvinska N, Vincent K, Khan I and Zakarya M (2022). Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing, Scientific Programming, 2022, Online publication date: 1-Jan-2022.
  42. Antwarg L, Miller R, Shapira B and Rokach L (2021). Explaining anomalies detected by autoencoders using Shapley Additive Explanations▪, Expert Systems with Applications: An International Journal, 186:C, Online publication date: 30-Dec-2022.
  43. Guo Z and Cho J Game Theoretic Opinion Models and Their Application in Processing Disinformation 2021 IEEE Global Communications Conference (GLOBECOM), (01-07)
  44. Pérez-Verdejo J, Sánchez-García Á, Ocharán-Hernández J, Mezura-Montes E and Cortés-Verdín K (2021). Requirements and GitHub Issues: An Automated Approach for Quality Requirements Classification, Programming and Computing Software, 47:8, (704-721), Online publication date: 1-Dec-2021.
  45. Lucca G, Borges E, Berri R, Emmendorfer L, Dimuro G and Asmus T On the Generalizations of the Choquet Integral for Application in FRBCs Intelligent Systems, (498-513)
  46. ACM
    Luo Y, Liang P, Wang C, Shahin M and Zhan J Characteristics and Challenges of Low-Code Development Proceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), (1-11)
  47. Gilmore E, Estivill-Castro V and Hexel R More Interpretable Decision Trees Hybrid Artificial Intelligent Systems, (280-292)
  48. Ienco D, Pereira-Santos D and de Carvalho A Evaluate Pseudo Labeling and CNN for Multi-variate Time Series Classification in Low-Data Regimes Artificial Neural Networks and Machine Learning – ICANN 2021, (126-137)
  49. Rak E and Szczur A Comparative assessment of aggregated classification algorithms with the use to mining a cyber-attack dataset 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  50. Kuo R, Chang C, Nguyen T and Liao T (2021). Application of genetic algorithm-based intuitionistic fuzzy weighted c-ordered-means algorithm to cluster analysis, Knowledge and Information Systems, 63:7, (1935-1959), Online publication date: 1-Jul-2021.
  51. ACM
    Roffarello A and De Russis L (2021). Understanding, Discovering, and Mitigating Habitual Smartphone Use in Young Adults, ACM Transactions on Interactive Intelligent Systems, 11:2, (1-34), Online publication date: 30-Jun-2021.
  52. Maliszewski M and Boryczka U Using MajorClust Algorithm for Sandbox-based ATM Security 2021 IEEE Congress on Evolutionary Computation (CEC), (1054-1061)
  53. ACM
    Stausholm N Improved Differentially Private Euclidean Distance Approximation Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (42-56)
  54. ACM
    Puspitasari S and Dhini A Piping Circuit Development using K-Prototype Clustering Proceedings of the 4th Asia Pacific Conference on Research in Industrial and Systems Engineering, (369-373)
  55. Wang X, Jiang X and Vaidya J (2021). Efficient verification for outsourced genome-wide association studies, Journal of Biomedical Informatics, 117:C, Online publication date: 1-May-2021.
  56. Divyashree B and Kumar G (2021). Breast Cancer Mass Detection in Mammograms Using Gray Difference Weight and MSER Detector, SN Computer Science, 2:2, Online publication date: 1-Apr-2021.
  57. Consoli S, Perrotta D and Turchi M Reduced Variable Neighbourhood Search for the Generation of Controlled Circular Data Variable Neighborhood Search, (83-98)
  58. ACM
    Bhiogade R, Jain P and Bhatt H AART: AI Assisted Review Tool for Marketing Creatives Proceedings of the 3rd ACM India Joint International Conference on Data Science & Management of Data (8th ACM IKDD CODS & 26th COMAD), (366-370)
  59. Bohani F, Suliman A, Saripuddin M, Sameon S, Md Salleh N, Nazeri S and Mandeep J (2021). A Comprehensive Analysis of Supervised Learning Techniques for Electricity Theft Detection, Journal of Electrical and Computer Engineering, 2021, Online publication date: 1-Jan-2021.
  60. Hsu C (2021). A multi-valued and sequential-labeled decision tree method for recommending sequential patterns in cold-start situations, Applied Intelligence, 51:1, (506-526), Online publication date: 1-Jan-2021.
  61. Marcilio-Jr W and Eler D (2020). SADIRE: a context-preserving sampling technique for dimensionality reduction visualizations, Journal of Visualization, 23:6, (999-1013), Online publication date: 1-Dec-2020.
  62. Chen X and Qiu Y (2020). An effective multi-level synchronization clustering method based on a linear weighted Vicsek model, Applied Intelligence, 50:11, (4063-4080), Online publication date: 1-Nov-2020.
  63. Bedi J and Toshniwal D (2019). Features denoising-based learning for porosity classification, Neural Computing and Applications, 32:21, (16519-16532), Online publication date: 1-Nov-2020.
  64. ACM
    Silva K and Cota E Predicting Prime Path Coverage Using Regression Analysis Proceedings of the XXXIV Brazilian Symposium on Software Engineering, (263-272)
  65. Cagnini H, Freitas A and Barros R An Evolutionary Algorithm for Learning Interpretable Ensembles of Classifiers Intelligent Systems, (18-33)
  66. Estivill-Castro V, Gilmore E and Hexel R Human-In-The-Loop Construction of Decision Tree Classifiers with Parallel Coordinates 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (3852-3859)
  67. ACM
    Bhuiyan F, Shakya R and Rahman A Can we use software bug reports to identify vulnerability discovery strategies? Proceedings of the 7th Symposium on Hot Topics in the Science of Security, (1-10)
  68. Wang Y, Zheng W, Dong H and Gao P Factors correlation mining on railway accidents using association rule learning algorithm 2020 IEEE 23rd International Conference on Intelligent Transportation Systems (ITSC), (1-6)
  69. Spenrath Y, Hassani M, Dongen B and Tariq H Why Did My Consumer Shop? Learning an Efficient Distance Metric for Retailer Transaction Data Machine Learning and Knowledge Discovery in Databases. Applied Data Science and Demo Track, (323-338)
  70. Haitao S (2019). Big data analysis of e-commerce loan risk of college students in the context of network finance, Information Systems and e-Business Management, 18:3, (439-454), Online publication date: 1-Sep-2020.
  71. Kuo R and Zulvia F (2020). Multi-objective cluster analysis using a gradient evolution algorithm, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:15, (11545-11559), Online publication date: 1-Aug-2020.
  72. Beg A, Islam M and Estivill-Castro V HeMI ++: A Genetic Algorithm based Clustering Technique for Sensible Clusters 2020 IEEE Congress on Evolutionary Computation (CEC), (1-8)
  73. Chen L, Chen D and Lai M (2019). A novel time-shifting method to find popular blog post topics, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:13, (9705-9725), Online publication date: 1-Jul-2020.
  74. Yu J, Zhong H and Kim S (2019). An Ensemble Feature Ranking Algorithm for Clustering Analysis, Journal of Classification, 37:2, (462-489), Online publication date: 1-Jul-2020.
  75. Yuvaraj N and Suresh Ghana Dhas C (2018). High-performance link-based cluster ensemble approach for categorical data clustering, The Journal of Supercomputing, 76:6, (4556-4579), Online publication date: 1-Jun-2020.
  76. Fatma N, Choudhary V, Sachdeva N and Rajput N Canonicalizing Knowledge Bases for Recruitment Domain Advances in Knowledge Discovery and Data Mining, (500-513)
  77. Aleryani A, Wang W and de la Iglesia B (2020). Multiple Imputation Ensembles (MIE) for Dealing with Missing Data, SN Computer Science, 1:3, Online publication date: 1-May-2020.
  78. Torres-Ruiz M, Mata F, Zagal R, Guzmán G, Quintero R and Moreno-Ibarra M (2018). A recommender system to generate museum itineraries applying augmented reality and social-sensor mining techniques, Virtual Reality, 24:1, (175-189), Online publication date: 1-Mar-2020.
  79. Kaya B (2020). Hotel recommendation system by bipartite networks and link prediction, Journal of Information Science, 46:1, (53-63), Online publication date: 1-Feb-2020.
  80. Zhou K and Yang S (2019). Effect of cluster size distribution on clustering: a comparative study of k-means and fuzzy c-means clustering, Pattern Analysis & Applications, 23:1, (455-466), Online publication date: 1-Feb-2020.
  81. ACM
    Ahmed M, Ali M, Ahmed N, Zamal M and Shamrat F The Impact of Software Fault Prediction in Real-World Application Proceedings of 2020 6th International Conference on Computing and Data Engineering, (247-251)
  82. Bae D, Jeong S, Hong J, Lee M, Ivanović M, Savić M and Kim S (2020). An Effective Approach to Outlier Detection Based on Centrality and Centre-Proximity, Informatica, 31:3, (435-458), Online publication date: 1-Jan-2020.
  83. Bastos N, Marques B, Adamatti D, Billa C and Rostro-Gonzalez H (2020). Analyzing EEG Signals Using Decision Trees, Computational Intelligence and Neuroscience, 2020, Online publication date: 1-Jan-2020.
  84. Kaya B (2019). A hotel recommendation system based on customer location: a link prediction approach, Multimedia Tools and Applications, 79:3-4, (1745-1758), Online publication date: 1-Jan-2020.
  85. Aryal S, Ting K, Washio T and Haffari G (2019). A comparative study of data-dependent approaches without learning in measuring similarities of data objects, Data Mining and Knowledge Discovery, 34:1, (124-162), Online publication date: 1-Jan-2020.
  86. ACM
    Khader M and Al-Naymat G An overview of various enhancements of DENCLUE algorithm Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, (1-7)
  87. Al-Rawi A (2020). Gatekeeping Fake News Discourses on Mainstream Media Versus Social Media, Social Science Computer Review, 37:6, (687-704), Online publication date: 1-Dec-2019.
  88. ACM
    Jabal A, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A and Williams C (2019). Methods and Tools for Policy Analysis, ACM Computing Surveys, 51:6, (1-35), Online publication date: 30-Nov-2019.
  89. Cuper M, Lóderer M and Rozinajová V Detection of Abnormal Load Consumption in the Power Grid Using Clustering and Statistical Analysis Intelligent Data Engineering and Automated Learning – IDEAL 2019, (464-475)
  90. Martarelli N and Nagano M Optimization of the Numeric and Categorical Attribute Weights in KAMILA Mixed Data Clustering Algorithm Intelligent Data Engineering and Automated Learning – IDEAL 2019, (20-27)
  91. Cerrada M, Aguilar J, Altamiranda J and Sánchez R (2019). A hybrid heuristic algorithm for evolving models in simultaneous scenarios of classification and clustering, Knowledge and Information Systems, 61:2, (755-798), Online publication date: 1-Nov-2019.
  92. Rohani A and Mamarabadi M (2019). Free alignment classification of dikarya fungi using some machine learning methods, Neural Computing and Applications, 31:11, (6995-7016), Online publication date: 1-Nov-2019.
  93. Alserafi A, Abelló A, Romero O and Calders T Keeping the Data Lake in Form: DS-kNN Datasets Categorization Using Proximity Mining Model and Data Engineering, (35-49)
  94. Guidotti R and Rossetti G “Know Thyself” How Personal Music Tastes Shape the Last.Fm Online Social Network Formal Methods. FM 2019 International Workshops, (146-161)
  95. ACM
    Cho J, Rager S, O’Donovan J, Adali S and Horne B (2019). Uncertainty-based False Information Propagation in Social Networks, ACM Transactions on Social Computing, 2:2, (1-34), Online publication date: 3-Oct-2019.
  96. ACM
    Wang J and Stantic B Facilitating Learning by Practice and Examples Proceedings of the 9th Balkan Conference on Informatics, (1-4)
  97. Fan Y, Shi Y, Kang K and Xing Q An Inflection Point Based Clustering Method for Sequence Data Web Information Systems and Applications, (201-212)
  98. Faial D, Bernardini F, Miranda L and Viterbo J Anomaly Detection in Vehicle Traffic Data Using Batch and Stream Supervised Learning Progress in Artificial Intelligence, (675-684)
  99. Kuo R and Zulvia F (2019). An improved differential evolution with cluster decomposition algorithm for automatic clustering, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:18, (8957-8973), Online publication date: 1-Sep-2019.
  100. ACM
    Cerquitelli T, Proto S, Ventura F, Apiletti D and Baralis E Towards a real-time unsupervised estimation of predictive model degradation Proceedings of Real-Time Business Intelligence and Analytics, (1-6)
  101. Fiedler N, Brandt H, Gutsche J, Vahl F, Hagge J and Bestmann M An Open Source Vision Pipeline Approach for RoboCup Humanoid Soccer RoboCup 2019: Robot World Cup XXIII, (376-386)
  102. Mojarad M, Nejatian S, Parvin H and Mohammadpoor M (2019). A fuzzy clustering ensemble based on cluster clustering and iterative Fusion of base clusters, Applied Intelligence, 49:7, (2567-2581), Online publication date: 1-Jul-2019.
  103. Fan J (2019). OPE-HCA: an optimal probabilistic estimation approach for hierarchical clustering algorithm, Neural Computing and Applications, 31:7, (2095-2105), Online publication date: 1-Jul-2019.
  104. Melo Neto J, Bernardino H and Barbosa H On the Impact of the Objective Function on Imbalanced Data using Cartesian Genetic Programming Neuroevolutionary Approaches 2019 IEEE Congress on Evolutionary Computation (CEC), (1860-1867)
  105. ACM
    Saeed N, Nam H, Haq M and Muhammad Saqib D (2018). A Survey on Multidimensional Scaling, ACM Computing Surveys, 51:3, (1-25), Online publication date: 31-May-2019.
  106. Liao Y, Koiwai K and Yamamoto T (2018). Design and Implementation of a Hierarchical‐Clustering CMAC PID Controller, Asian Journal of Control, 21:3, (1077-1087), Online publication date: 22-May-2019.
  107. Ekpenyong M, Ananga A, Udoh E and Umoh N Speech Prosody Extraction for Ibibio Emotions Analysis and Classification Human Language Technology. Challenges for Computer Science and Linguistics, (197-213)
  108. ACM
    de Santana V and Baranauskas M Continuous Web Personalization using Selector-template Pairs Proceedings of the 16th International Web for All Conference, (1-9)
  109. ACM
    Li M An improved FCM clustering algorithm based on cosine similarity Proceedings of the 2019 International Conference on Data Mining and Machine Learning, (103-109)
  110. El Hajji S, Moukafih N and Orhanou G Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems Codes, Cryptology and Information Security, (433-451)
  111. ACM
    Zhao Y, Dai L, Peng L, Song Y and Zhou Z Analysis of Spatial Distribution of China's station-free bike-sharing by Clustering Algorithms Proceedings of the 2019 4th International Conference on Mathematics and Artificial Intelligence, (15-19)
  112. Costaguta R, Santana-Mansilla P, Lescano G and Missio D (2021). Mining Associations Between Collaborative Skills and Group Roles in Collaborative E-Learning Environments, Journal of Information Technology Research, 12:2, (159-174), Online publication date: 1-Apr-2019.
  113. ACM
    Elbadrawy A and Karypis G UPM Proceedings of the 9th International Conference on Learning Analytics & Knowledge, (373-382)
  114. Nair P and Chaudhury K (2018). Fast High-Dimensional Bilateral and Nonlocal Means Filtering, IEEE Transactions on Image Processing, 28:3, (1470-1481), Online publication date: 1-Mar-2019.
  115. Mimis M, El Hajji M, Es-saady Y, Oueld Guejdi A, Douzi H and Mammass D (2019). A framework for smart academic guidance using educational data mining, Education and Information Technologies, 24:2, (1379-1393), Online publication date: 1-Mar-2019.
  116. ACM
    Yang X, Zhou W, Shu N and Zhang H A Fast and Efficient Local Outlier Detection in Data Streams Proceedings of the 2019 International Conference on Image, Video and Signal Processing, (111-116)
  117. ACM
    Yan H, Li Z, Liu L, Yin S and Wei S Constructing Concurrent Data Structures on FPGA with Channels Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (172-177)
  118. Yi P and Li W (2018). Induced cluster‐based OWA operators with reliability measures and the application in group decision‐making, International Journal of Intelligent Systems, 34:4, (527-540), Online publication date: 19-Feb-2019.
  119. Askarizade Haghighi M, Maeen M and Haghparast M (2019). An Energy-Efficient Dynamic Resource Management Approach Based on Clustering and Meta-Heuristic Algorithms in Cloud Computing IaaS Platforms, Wireless Personal Communications: An International Journal, 104:4, (1367-1391), Online publication date: 1-Feb-2019.
  120. Ting K, Zhu Y, Carman M, Zhu Y, Washio T and Zhou Z (2019). Lowest probability mass neighbour algorithms, Machine Language, 108:2, (331-376), Online publication date: 1-Feb-2019.
  121. Altoaimy L, Kurdi H, Alromih A, Alomari A, Alrogi E and Ahmed S Enhanced Distance-Based Gossip Protocols for Wireless Sensor Networks 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), (1-4)
  122. (2019). Effective selling strategies for online auctions on eBay, International Journal of Business Information Systems, 30:2, (125-151), Online publication date: 1-Jan-2019.
  123. Chen L (2019). Based on The Document-Link and Time-Clue Relationships Between Blog Posts to Improve the Performance of Google Blog Search, International Journal on Semantic Web & Information Systems, 15:1, (52-75), Online publication date: 1-Jan-2019.
  124. Gergin Z, Tunçbilek N and Esnaf Ş (2019). Clustering Approach Using Artificial Bee Colony Algorithm for Healthcare Waste Disposal Facility Location Problem, International Journal of Operations Research and Information Systems, 10:1, (56-75), Online publication date: 1-Jan-2019.
  125. Martínez V, Berzal F, Cubero J and Cimini G (2019). NOESIS, Complexity, 2019, Online publication date: 1-Jan-2019.
  126. Dai T, Dean D, Wang P, Gu X and Lu S (2018). Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures, IEEE Transactions on Parallel and Distributed Systems, 30:1, (107-118), Online publication date: 1-Jan-2019.
  127. Guo W, Lu A, Meng X, Gao X and Ma N Broad Coverage Precoding for Massive MIMO with Alternating Projections 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  128. Zhang X, Zhang X, Liu H and Liu X (2018). Partially Related Multi-Task Clustering, IEEE Transactions on Knowledge and Data Engineering, 30:12, (2367-2380), Online publication date: 1-Dec-2018.
  129. ACM
    Buathong W and Jarupunphol P Further Experiments on A Combination of Linear SVM Weight and ReliefF for Dimensionality Reduction Proceedings of the 2018 International Conference on Artificial Intelligence and Virtual Reality, (6-9)
  130. Adnan M, Islam M and Akbar M On Improving the Prediction Accuracy of a Decision Tree Using Genetic Algorithm Advanced Data Mining and Applications, (80-94)
  131. Lu G, Li B, Yang W and Yin J (2018). Unsupervised feature selection with graph learning via low-rank constraint, Multimedia Tools and Applications, 77:22, (29531-29549), Online publication date: 1-Nov-2018.
  132. Brodić D and Amelio A (2018). Association rule mining for the usability of the CAPTCHA interfaces, Multimedia Systems, 24:6, (625-644), Online publication date: 1-Nov-2018.
  133. ACM
    de Mendonça F, Gasparini I, Schroeder R, Silveira M and Barbosa S Scientific Collaboration Networks of the Academic Brazilian Community of HCI Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-11)
  134. ACM
    Li Y, Ge T and Chen C VTeller Proceedings of the 27th ACM International Conference on Information and Knowledge Management, (577-586)
  135. ACM
    Zhang L, Yang Z, He Y, Zhang Z, Qian Z, Hong G, Zhang Y and Yang M Invetter Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1165-1178)
  136. Dinh D and Huynh V k-CCM: A Center-Based Algorithm for Clustering Categorical Data with Missing Values Modeling Decisions for Artificial Intelligence, (267-279)
  137. Hsieh K, Ananthanarayanan G, Bodik P, Venkataraman S, Bahl P, Philipose M, Gibbons P and Mutlu O Focus Proceedings of the 13th USENIX conference on Operating Systems Design and Implementation, (269-286)
  138. ACM
    Timoney J, Lysaght T and Tshibasu C mytune Proceedings of the 5th International Conference on Digital Libraries for Musicology, (11-20)
  139. Bourel M, Canale E, Robledo F, Romero P and Stábile L A GRASP/VND Heuristic for the Max Cut-Clique Problem Machine Learning, Optimization, and Data Science, (357-367)
  140. Brodić D, Amelio A, Draganov I and Janković R Exploring the Usability of the Dice CAPTCHA by Advanced Statistical Analysis Artificial Intelligence: Methodology, Systems, and Applications, (152-162)
  141. Natilli M, Monreale A, Guidotti R and Pappalardo L Exploring Students Eating Habits Through Individual Profiling and Clustering Analysis ECML PKDD 2018 Workshops, (156-171)
  142. Guidotti R, Soldani J, Neri D, Brogi A and Pedreschi D Helping Your Docker Images to Spread Based on Explainable Models Machine Learning and Knowledge Discovery in Databases, (205-221)
  143. Liu Y and Li X Predictive Modeling for Advanced Virtual Metrology: A Tree-Based Approach 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA), (845-852)
  144. ACM
    Ghodrati A, Blagojevic R, Guesgen H, Marsland S and Plimmer B The role of grouping in sketched diagram recognition Proceedings of the Joint Symposium on Computational Aesthetics and Sketch-Based Interfaces and Modeling and Non-Photorealistic Animation and Rendering, (1-12)
  145. ACM
    Shaik S and Baskiyar S Hierarchical and Autonomous Fog Architecture Workshop Proceedings of the 47th International Conference on Parallel Processing, (1-8)
  146. Maione C, Souza V, Togni L, Costa J, Campiglia A, Barbosa F and Barbosa R (2018). Establishing chemical profiling for ecstasy tablets based on trace element levels and support vector machine, Neural Computing and Applications, 30:3, (947-955), Online publication date: 1-Aug-2018.
  147. Cagliero L, Garza P, Kavoosifar M and Baralis E (2018). Discovering cross-topic collaborations among researchers by exploiting weighted association rules, Scientometrics, 116:2, (1273-1301), Online publication date: 1-Aug-2018.
  148. Wang W, Zeng C and Li T Discovering Multiple Time Lags of Temporal Dependencies from Fluctuating Events Web and Big Data, (121-137)
  149. Suo M, Zhu B, Zhang Y, An R and Li S (2018). Fuzzy Bayes risk based on Mahalanobis distance and Gaussian kernel for weight assignment in labeled multiple attribute decision making, Knowledge-Based Systems, 152:C, (26-39), Online publication date: 15-Jul-2018.
  150. Baskota A and Ng Y A Graduate School Recommendation System Using the Multi-Class Support Vector Machine and KNN Approaches 2018 IEEE International Conference on Information Reuse and Integration (IRI), (277-284)
  151. Budhathoki D, Dasgupta D and Jain P Big Data Framework for Finding Patterns in Multi-market Trading Data Big Data – BigData 2018, (237-250)
  152. Li J, Xie S, Wang J, Lin Y and Chen Q Prediction and Learning Analysis Using Ensemble Classifier Based on GA in SPOC Experiments Data Mining and Big Data, (339-348)
  153. Böhmer K and Rinderle-Ma S Association Rules for Anomaly Detection and Root Cause Analysis in Process Executions Advanced Information Systems Engineering, (3-18)
  154. Ibrahim R (2018). Sharing delay information in service systems, Queueing Systems: Theory and Applications, 89:1-2, (49-79), Online publication date: 1-Jun-2018.
  155. ACM
    Rahman A Comprehension effort and programming activities Proceedings of the 15th International Conference on Mining Software Repositories, (66-69)
  156. ACM
    Rahman A Characteristics of defective infrastructure as code scripts in DevOps Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, (476-479)
  157. Suh Y and Park Y (2018). Identifying and structuring service functions of mobile applications in Google's Android Market, Information Systems and e-Business Management, 16:2, (383-406), Online publication date: 1-May-2018.
  158. Zhang Y, Tang Q, Niu L, Dai T, Xiao X and Xia S Self -Paced Mixture of T Distribution Model 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (2796-2800)
  159. Chen X (2018). Fast synchronization clustering algorithms based on spatial index structures, Expert Systems with Applications: An International Journal, 94:C, (276-290), Online publication date: 15-Mar-2018.
  160. Fang X and Hu P (2018). Top persuader prediction for social networks, MIS Quarterly, 42:1, (63-82), Online publication date: 1-Mar-2018.
  161. Lau K, Lam T, Kam B, Nkhoma M, Richardson J and Thomas S (2018). The role of textbook learning resources in e-learning, Computers & Education, 118:C, (10-24), Online publication date: 1-Mar-2018.
  162. ACM
    Chen P, Chen Y and Jin B A new soft assignment K-means algorithm Proceedings of the 2nd International Conference on Machine Learning and Soft Computing, (57-61)
  163. Papamartzivanos D, Gmez Mrmol F and Kambourakis G (2018). Dendron, Future Generation Computer Systems, 79:P2, (558-574), Online publication date: 1-Feb-2018.
  164. Cupertino T, Guimares Carneiro M, Zheng Q, Zhang J and Zhao L (2018). A scheme for high level data classification using random walk and network measures, Expert Systems with Applications: An International Journal, 92:C, (289-303), Online publication date: 1-Feb-2018.
  165. ACM
    Mallick A, del Pobil A and Cervera E Deep Learning based Object Recognition for Robot picking task Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, (1-9)
  166. Islam M, Estivill-Castro V, Rahman M and Bossomaier T (2018). Combining K-Means and a genetic algorithm through a novel arrangement of genetic operators for high quality clustering, Expert Systems with Applications: An International Journal, 91:C, (402-417), Online publication date: 1-Jan-2018.
  167. Sharma R and Verma K (2018). A fuzzy inference model for rainfall prediction, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 35:1, (807-821), Online publication date: 1-Jan-2018.
  168. Tahmassebi A, Gandomi A, Schulte M, Goudriaan A, Foo S, Meyer-Baese A and Comminiello D (2018). Optimized Naive-Bayes and Decision Tree Approaches for fMRI Smoking Cessation Classification, Complexity, 2018, Online publication date: 1-Jan-2018.
  169. Garanina N, Sidorova E and Seryi A (2018). Multiagent Approach to Coreference Resolution Based on the Multifactor Similarity in Ontology Population, Programming and Computing Software, 44:1, (23-34), Online publication date: 1-Jan-2018.
  170. Mo D and Duarte M (2018). Compressive parameter estimation via K-median clustering, Signal Processing, 142:C, (36-52), Online publication date: 1-Jan-2018.
  171. Olszak C, Bartu T and Lorek P (2018). A comprehensive framework of information system design to provide organizational creativity support, Information and Management, 55:1, (94-108), Online publication date: 1-Jan-2018.
  172. Ayadi A, Ghorbel O, Obeid A and Abid M (2017). Outlier detection approaches for wireless sensor networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 129:P1, (319-333), Online publication date: 24-Dec-2017.
  173. Garciarena U and Santana R (2017). An extensive analysis of the interaction between missing data types, imputation methods, and supervised classifiers, Expert Systems with Applications: An International Journal, 89:C, (52-65), Online publication date: 15-Dec-2017.
  174. Cho J, Cook T, Rager S, O'Donovan J and Adali S Modeling and Analysis of Uncertainty-Based False Information Propagation in Social Networks GLOBECOM 2017 - 2017 IEEE Global Communications Conference, (1-7)
  175. Nidheesh N, Abdul Nazeer K and Ameer P (2017). An enhanced deterministic K-Means clustering algorithm for cancer subtype prediction from gene expression data, Computers in Biology and Medicine, 91:C, (213-221), Online publication date: 1-Dec-2017.
  176. Salgado C, Ferreira M and Vieira S (2017). Mixed Fuzzy Clustering for Misaligned Time Series, IEEE Transactions on Fuzzy Systems, 25:6, (1777-1794), Online publication date: 1-Dec-2017.
  177. Meng Q and Sha J (2017). Tree-based frequent itemsets mining for analysis of life-satisfaction and loneliness of retired athletes, Cluster Computing, 20:4, (3327-3335), Online publication date: 1-Dec-2017.
  178. Verbeke W, Martens D and Baesens B (2017). RULEM, Applied Soft Computing, 60:C, (858-873), Online publication date: 1-Nov-2017.
  179. Wong T and Yang N (2017). Dependency Analysis of Accuracy Estimates in k-Fold Cross Validation, IEEE Transactions on Knowledge and Data Engineering, 29:11, (2417-2427), Online publication date: 1-Nov-2017.
  180. Mithal V, Nayak G, Khandelwal A, Kumar V, Oza N and Nemani R (2017). RAPT: Rare Class Prediction in Absence of True Labels, IEEE Transactions on Knowledge and Data Engineering, 29:11, (2484-2497), Online publication date: 1-Nov-2017.
  181. VanDam C, Kanthawala S, Pratt W, Chai J and Huh J (2017). Detecting clinically related content in online patient posts, Journal of Biomedical Informatics, 75:C, (96-106), Online publication date: 1-Nov-2017.
  182. Batmaz n, Danolu S, Yazc C and Kartal-Ko E (2017). A data mining application to deposit pricing, Applied Soft Computing, 60:C, (808-819), Online publication date: 1-Nov-2017.
  183. ACM
    Gasparini I, de Mendonça F, Silveira M, Diniz S, Barbosa J and Schroeder R Crossing the borders of IHC Proceedings of the XVI Brazilian Symposium on Human Factors in Computing Systems, (1-10)
  184. ACM
    López S, Redondo R and Vilas A Discovering knowledge from student interactions Proceedings of the 5th International Conference on Technological Ecosystems for Enhancing Multiculturality, (1-8)
  185. Chen L (2017). Finding the Semantic Relationship Between Wikipedia Articles Based on a Useful Entry Relationship, International Journal of Data Warehousing and Mining, 13:4, (33-52), Online publication date: 1-Oct-2017.
  186. Sun Y and Wang B (2017). Indoor corner recognition from crowdsourced trajectories using smartphone sensors, Expert Systems with Applications: An International Journal, 82:C, (266-277), Online publication date: 1-Oct-2017.
  187. Pendharkar P (2017). Bayesian posterior misclassification error risk distributions for ensemble classifiers, Engineering Applications of Artificial Intelligence, 65:C, (484-492), Online publication date: 1-Oct-2017.
  188. Papamitsiou Z and Economides A (2017). Exhibiting achievement behavior during computer-based testing, Computers in Human Behavior, 75:C, (423-438), Online publication date: 1-Oct-2017.
  189. Diao Y and Shwartz L (2017). Building Automated Data Driven Systems for IT Service Management, Journal of Network and Systems Management, 25:4, (848-883), Online publication date: 1-Oct-2017.
  190. ACM
    Costaguta R, Lescano G, Santana-Mansilla P, Missio D and Miro P Using data mining for discovering relationships between collaboration skills and group roles Proceedings of the XVIII International Conference on Human Computer Interaction, (1-2)
  191. Nair P and Chaudhury K Fast high-dimensional filtering using clustering 2017 IEEE International Conference on Image Processing (ICIP), (240-244)
  192. Swiderski B, Osowski S, Kurek J, Kruk M, Lugowska I, Rutkowski P and Barhoumi W (2017). Novel methods of image description and ensemble of classifiers in application to mammogram analysis, Expert Systems with Applications: An International Journal, 81:C, (67-78), Online publication date: 15-Sep-2017.
  193. Baralis E, Cagliero L, Cerquitelli T, Garza P and Pulvirenti F (2017). Discovering profitable stocks for intraday trading, Information Sciences: an International Journal, 405:C, (91-106), Online publication date: 1-Sep-2017.
  194. (2017). Early detection of university students with potential difficulties, Decision Support Systems, 101:C, (1-11), Online publication date: 1-Sep-2017.
  195. ACM
    Ristovski K, Gupta C, Harada K and Tang H Dispatch with Confidence Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1981-1989)
  196. Latkowski T and Osowski S (2017). Gene selection in autism Comparative study, Neurocomputing, 250:C, (37-44), Online publication date: 9-Aug-2017.
  197. Xia Y, Zhang L, Liu Z, Nie L and Li X (2017). Weakly Supervised Multimodal Kernel for Categorizing Aerial Photographs, IEEE Transactions on Image Processing, 26:8, (3748-3758), Online publication date: 1-Aug-2017.
  198. Wang C and Chin H (2017). Integrating affective features with engineering features to seek the optimal product varieties with respect to the niche segments, Advanced Engineering Informatics, 33:C, (350-359), Online publication date: 1-Aug-2017.
  199. Hassani M and Seidl T (2017). Using internal evaluation measures to validate the quality of diverse stream clustering algorithms, Vietnam Journal of Computer Science, 4:3, (171-183), Online publication date: 1-Aug-2017.
  200. ACM
    Utami N and Surjandari I Identifying Consumer Buying Behavior Differences through Market Basket Analysis in Multiple Outlet Types Proceedings of the International Conference on Business and Information Management, (82-86)
  201. ACM
    Tangpathompong N, Suksawatchon U and Suksawatchon J The Dynamic Hyper-ellipsoidal Micro-Clustering for Evolving Data Stream Using Only Incoming Datum Proceedings of the 2nd International Conference on Intelligent Information Processing, (1-8)
  202. ACM
    Iren D and Reijers H Leveraging business process improvement with natural language processing and organizational semantic knowledge Proceedings of the 2017 International Conference on Software and System Process, (100-108)
  203. Machado J, Silva Á, Rua F, Veloso R, Portela F, Santos M and Abelha A (2017). Categorize Readmitted Patients in Intensive Medicine by Means of Clustering Data Mining, International Journal of E-Health and Medical Communications, 8:3, (22-37), Online publication date: 1-Jul-2017.
  204. Dinc I, Dinc S, Sigdel M, Sigdel M, Pusey M and Aygun R (2017). Super-Thresholding, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 14:4, (986-998), Online publication date: 1-Jul-2017.
  205. Onan A, Korukolu S and Bulut H (2017). A hybrid ensemble pruning approach based on consensus clustering and multi-objective evolutionary algorithm for sentiment classification, Information Processing and Management: an International Journal, 53:4, (814-833), Online publication date: 1-Jul-2017.
  206. Cagnini H, Barros R and Basgalupp M Estimation of distribution algorithms for decision-tree induction 2017 IEEE Congress on Evolutionary Computation (CEC), (2022-2029)
  207. Bianchi F, Palmonari M, Cremaschi M and Fersini E Actively Learning to Rank Semantic Associations for Personalized Contextual Exploration of Knowledge Graphs The Semantic Web, (120-135)
  208. Rahman A, Pradhan P, Partho A and Williams L Predicting Android application security and privacy risk with static code metrics Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, (149-153)
  209. Kim J (2017). Construction and evaluation of structured association map for visual exploration of association rules, Expert Systems with Applications: An International Journal, 74:C, (70-81), Online publication date: 15-May-2017.
  210. ACM
    Gan J and Tao Y Dynamic Density Based Clustering Proceedings of the 2017 ACM International Conference on Management of Data, (1493-1507)
  211. Wong T (2017). Parametric methods for comparing the performance of two classification algorithms evaluated by k-fold cross validation on multiple data sets, Pattern Recognition, 65:C, (97-107), Online publication date: 1-May-2017.
  212. Huang C, Wang D and Mann B (2017). Towards social-aware interesting place finding in social sensing applications, Knowledge-Based Systems, 123:C, (31-40), Online publication date: 1-May-2017.
  213. Tizpaz-Niari S, Černý P, Chang B, Sankaranarayanan S and Trivedi A Discriminating Traces with Time Proceedings, Part II, of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems - Volume 10206, (21-37)
  214. Amer-Yahia S, Kleisarchaki S, Kolloju N, Lakshmanan L and Zamar R Exploring Rated Datasets with Rating Maps Proceedings of the 26th International Conference on World Wide Web, (1411-1419)
  215. Licorish S and MacDonell S (2017). Exploring software developers work practices, Information and Management, 54:3, (364-382), Online publication date: 1-Apr-2017.
  216. Lu W, Li Z and Chu J (2017). A novel computer-aided diagnosis system for breast MRI based on feature selection and ensemble learning, Computers in Biology and Medicine, 83:C, (157-165), Online publication date: 1-Apr-2017.
  217. Sun Y and Wang B Indoor Corner Detection and Matching from Crowdsourced Movement Trajectories 2017 IEEE Wireless Communications and Networking Conference (WCNC), (1-6)
  218. Mendes R, Wanner E, Martins F and Sarubbi J Dimensionality Reduction Approach for Many-Objective Vehicle Routing Problem with Demand Responsive Transport 9th International Conference on Evolutionary Multi-Criterion Optimization - Volume 10173, (438-452)
  219. Francis H and Kusiak A (2017). Prediction of Engine Demand with a Data-driven Approach, Procedia Computer Science, 103:C, (28-35), Online publication date: 1-Mar-2017.
  220. Su Y, Luarn P, Lee Y and Yen S (2017). Creating an invalid defect classification model using text mining on server development, Journal of Systems and Software, 125:C, (197-206), Online publication date: 1-Mar-2017.
  221. Rizzo G, Meo R, Pensa R, Falcone G and Troncy R (2017). Shaping City Neighborhoods Leveraging Crowd Sensors, Information Systems, 64:C, (368-378), Online publication date: 1-Mar-2017.
  222. Li J, Ma S, Le T, Liu L and Liu J (2017). Causal Decision Trees, IEEE Transactions on Knowledge and Data Engineering, 29:2, (257-271), Online publication date: 1-Feb-2017.
  223. Zeng Y, Chen X, Ong Y, Tang J and Xiang Y (2017). Structured Memetic Automation for Online Human-Like Social Behavior Learning, IEEE Transactions on Evolutionary Computation, 21:1, (102-115), Online publication date: 1-Feb-2017.
  224. Sánchez A, Segura S, Parejo J and Ruiz-Cortés A (2017). Variability testing in the wild, Software and Systems Modeling (SoSyM), 16:1, (173-194), Online publication date: 1-Feb-2017.
  225. ACM
    Hao S and Wang H (2017). Exploring Domain Name Based Features on the Effectiveness of DNS Caching, ACM SIGCOMM Computer Communication Review, 47:1, (36-42), Online publication date: 17-Jan-2017.
  226. (2017). Improving ATM coverage area using density based clustering algorithm and voronoi diagrams, Information Sciences: an International Journal, 376:C, (1-20), Online publication date: 10-Jan-2017.
  227. Zandian Z and Keyvanpour M (2017). Systematic identification and analysis of different fraud detection approaches based on the strategy ahead, International Journal of Knowledge-based and Intelligent Engineering Systems, 21:2, (123-134), Online publication date: 1-Jan-2017.
  228. Wang Y, Liu X, Xiang L and Franco L (2017). GA-Based Membrane Evolutionary Algorithm for Ensemble Clustering, Computational Intelligence and Neuroscience, 2017, Online publication date: 1-Jan-2017.
  229. Khanmohammadi S, Adibeig N and Shanehbandy S (2017). An improved overlapping k-means clustering method for medical applications, Expert Systems with Applications: An International Journal, 67:C, (12-18), Online publication date: 1-Jan-2017.
  230. Beg A, Islam M and Estivill-Castro V (2016). Genetic algorithm with healthy population and multiple streams sharing information for clustering, Knowledge-Based Systems, 114:C, (61-78), Online publication date: 15-Dec-2016.
  231. Adnan M and Islam M On Improving Random Forest for Hard-to-Classify Records Advanced Data Mining and Applications, (558-566)
  232. Doran D and Gokhale S (2016). An integrated method for real time and offline web robot detection, Expert Systems: The Journal of Knowledge Engineering, 33:6, (592-606), Online publication date: 1-Dec-2016.
  233. Vanden Broucke S, Caron F, Lismont J, Vanthienen J and Baesens B (2016). On the gap between reality and registration, Information Technology and Management, 17:4, (393-410), Online publication date: 1-Dec-2016.
  234. Madhikermi M, Kubler S, Robert J, Buda A and Främling K (2016). Data quality assessment of maintenance reporting procedures, Expert Systems with Applications: An International Journal, 63:C, (145-164), Online publication date: 30-Nov-2016.
  235. Cordeiro de Amorim R, Makarenkov V and Mirkin B (2016). A-Wardpβ, Information Sciences: an International Journal, 370:C, (343-354), Online publication date: 20-Nov-2016.
  236. Debnath M, Tripathi P and Elmasri R Preference-Aware Successive POI Recommendation with Spatial and Temporal Influence Social Informatics, (347-360)
  237. ACM
    Washha M, Qaroush A and Sedes F Leveraging time for spammers detection on Twitter Proceedings of the 8th International Conference on Management of Digital EcoSystems, (109-116)
  238. Zhang Y, Lu H, Zhang L, Ruan X and Sakai S (2016). Video anomaly detection based on locality sensitive hashing filters, Pattern Recognition, 59:C, (302-311), Online publication date: 1-Nov-2016.
  239. Boran F, Akay D and Yager R (2016). An overview of methods for linguistic summarization with fuzzy sets, Expert Systems with Applications: An International Journal, 61:C, (356-377), Online publication date: 1-Nov-2016.
  240. Les T, Markiewicz T, Osowski S, Kozlowski W and Jesiotr M (2016). Fusion of FISH image analysis methods of HER2 status determination in breast cancer, Expert Systems with Applications: An International Journal, 61:C, (78-85), Online publication date: 1-Nov-2016.
  241. ACM
    Chuah S, Wu H, Lu Y, Yu L and Bressan S Bus Routes Design and Optimization via Taxi Data Analytics Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (2417-2420)
  242. Adnan M and Islam M (2016). Optimizing the number of trees in a decision forest to discover a subforest with high ensemble accuracy using a genetic algorithm, Knowledge-Based Systems, 110:C, (86-97), Online publication date: 15-Oct-2016.
  243. ACM
    Wyatt M, Johnston T, Papas M and Taufer M Development of a Scalable Method for Creating Food Groups Using the NHANES Dataset and MapReduce Proceedings of the 7th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics, (118-127)
  244. Kuby M and Joseph L (2016). The Location Types of US Retailers, International Journal of Applied Geospatial Research, 7:4, (1-22), Online publication date: 1-Oct-2016.
  245. Alizadehsani R, Zangooei M, Hosseini M, Habibi J, Khosravi A, Roshanzamir M, Khozeimeh F, Sarrafzadegan N and Nahavandi S (2016). Coronary artery disease detection using computational intelligence methods, Knowledge-Based Systems, 109:C, (187-197), Online publication date: 1-Oct-2016.
  246. García-Rudolph A and Gibert K (2016). Understanding effects of cognitive rehabilitation under a knowledge discovery approach, Engineering Applications of Artificial Intelligence, 55:C, (165-185), Online publication date: 1-Oct-2016.
  247. (2016). Mining balance disorders' data for the development of diagnostic decision support systems, Computers in Biology and Medicine, 77:C, (240-248), Online publication date: 1-Oct-2016.
  248. Liu Z, Zhang Q, Boutaba R, Liu Y and Wang B (2016). OPTIMA, Journal of Network and Systems Management, 24:4, (859-883), Online publication date: 1-Oct-2016.
  249. Bordino I, Lalmas M, Mejova Y and Van Laere O (2016). Beyond entities: promoting explorative search with bundles, Information Retrieval, 19:5, (447-486), Online publication date: 1-Oct-2016.
  250. Kanda J, Carvalho A, Hruschka E, Soares C and Brazdil P (2016). Meta-learning to select the best meta-heuristic for the Traveling Salesman Problem, Neurocomputing, 205:C, (393-406), Online publication date: 12-Sep-2016.
  251. Yu J and Kim S (2016). Density-based geodesic distance for identifying the noisy and nonlinear clusters, Information Sciences: an International Journal, 360:C, (231-243), Online publication date: 10-Sep-2016.
  252. Bastos N, Adamatti D and Billa C (2016). Discovering Patterns in Brain Signals Using Decision Trees, Computational Intelligence and Neuroscience, 2016, (14), Online publication date: 1-Sep-2016.
  253. Li L, Ye J, Deng F, Xiong S and Zhong L (2016). A comparison study of clustering algorithms for microblog posts, Cluster Computing, 19:3, (1333-1345), Online publication date: 1-Sep-2016.
  254. Erdem M, Boran F and Akay D (2016). Classification of Risks of Occupational Low Back Disorders with Support Vector Machines, Human Factors in Ergonomics & Manufacturing, 26:5, (550-558), Online publication date: 1-Sep-2016.
  255. ACM
    Mazinanian D and Tsantalis N Migrating cascading style sheets to preprocessors by introducing mixins Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, (672-683)
  256. Lundström J, Järpe E and Verikas A (2016). Detecting and exploring deviating behaviour of smart home residents, Expert Systems with Applications: An International Journal, 55:C, (429-440), Online publication date: 15-Aug-2016.
  257. ACM
    Ting K, Zhu Y, Carman M, Zhu Y and Zhou Z Overcoming Key Weaknesses of Distance-based Neighbourhood Methods using a Data Dependent Dissimilarity Measure Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1205-1214)
  258. Lee J, Kim D, Kim S and Park S (2016). Decomposing class responsibilities using distance-based method similarity, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:4, (612-630), Online publication date: 1-Aug-2016.
  259. Sohrabi M and Akbari S (2016). A comprehensive study on the effects of using data mining techniques to predict tie strength, Computers in Human Behavior, 60:C, (534-541), Online publication date: 1-Jul-2016.
  260. ACM
    Basak J, Wadhwani K and Voruganti K (2016). Storage Workload Identification, ACM Transactions on Storage, 12:3, (1-30), Online publication date: 27-Jun-2016.
  261. ACM
    Baralis E, Cagliero L and Cerquitelli T Supporting stock trading in multiple foreign markets Proceedings of the Second International Workshop on Data Science for Macro-Modeling, (1-6)
  262. ACM
    Menk A and Sebastiá L Predicting the Human Curiosity from Users' Profiles on Facebook Proceedings of the 4th Spanish Conference on Information Retrieval, (1-8)
  263. Hsu C and Huang W (2016). Integrated dimensionality reduction technique for mixed-type data involving categorical values, Applied Soft Computing, 43:C, (199-209), Online publication date: 1-Jun-2016.
  264. Silva J, Baiao F and Revoredo K Interactive Ontology Alignment using Alignment Antipatterns: A First Experiment Proceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era - Volume 1, (208-215)
  265. Yıldırım N and Uzunoğlu B Data Mining via Association Rules for Power Ramps Detected by Clustering or Optimization Special Issue on Cyberworlds and Cybersecurity on Transactions on Computational Science XXVIII - Volume 9590, (163-176)
  266. ACM
    Kovanović V, Joksimović S, Waters Z, Gašević D, Kitto K, Hatala M and Siemens G Towards automated content analysis of discussion transcripts Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, (15-24)
  267. Swapna C, Kumar V and Murthy J (2016). Improving Efficiency of K-Means Algorithm for Large Datasets, International Journal of Rough Sets and Data Analysis, 3:2, (1-9), Online publication date: 1-Apr-2016.
  268. Swiderski B, Osowski S, Kruk M and Barhoumi W (2016). Aggregation of classifiers ensemble using local discriminatory power and quantiles, Expert Systems with Applications: An International Journal, 46:C, (316-323), Online publication date: 15-Mar-2016.
  269. Rossi R, Lopes A and Rezende S (2016). Optimization and label propagation in bipartite heterogeneous networks to improve transductive classification of texts, Information Processing and Management: an International Journal, 52:2, (217-257), Online publication date: 1-Mar-2016.
  270. Sajedi H (2016). Biometric verification by palmprint using contourlet transform, Intelligent Decision Technologies, 10:4, (443-451), Online publication date: 1-Jan-2016.
  271. Yongsiriwit K, Assy N and Gaaloul W (2016). A semantic framework for configurable business process as a service in the cloud, Journal of Network and Computer Applications, 59:C, (168-184), Online publication date: 1-Jan-2016.
  272. Tian D, Zhu Y, Xia H, Wang J and Liu H A Quality Analysis Method for the Fuel-level Data of IOV Proceedings of the Second International Conference on Internet of Vehicles - Safe and Intelligent Mobility - Volume 9502, (176-185)
  273. Xu H, Yuan H, Ma B and Qian Y (2015). Where to go and what to play, Journal of Information Science, 41:6, (830-854), Online publication date: 1-Dec-2015.
  274. ACM
    Toumi L, Moussaoui A and Ugur A EMeD-Part Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication, (1-7)
  275. Wanderley G, Tacla C, Barthès J and Paraiso E (2015). Knowledge discovery in task-oriented dialogue, Expert Systems with Applications: An International Journal, 42:20, (6807-6818), Online publication date: 15-Nov-2015.
  276. Zheng B, Zhang J, Yoon S, Lam S, Khasawneh M and Poranki S (2015). Predictive modeling of hospital readmissions using metaheuristics and data mining, Expert Systems with Applications: An International Journal, 42:20, (7110-7120), Online publication date: 15-Nov-2015.
  277. Dias S and Vieira N (2015). Concept lattices reduction, Expert Systems with Applications: An International Journal, 42:20, (7084-7097), Online publication date: 15-Nov-2015.
  278. ACM
    Aydin B, Akkineni V and Angryk R Time-efficient significance measure for discovering spatiotemporal co-occurrences from data with unbalanced characteristics Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-4)
  279. ACM
    Guidotti R, Trasarti R and Nanni M TOSCA Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, (1-10)
  280. Xin Lin , Jianliang Xu and Haibo Hu (2015). Reverse Keyword Search for Spatio-Textual Top-$k$ Queries in Location-Based Services, IEEE Transactions on Knowledge and Data Engineering, 27:11, (3056-3069), Online publication date: 1-Nov-2015.
  281. ACM
    Kumari S, Maheshwari A, Goyal P and Goyal N Parallel Framework for Efficient k-means Clustering Proceedings of the 8th Annual ACM India Conference, (63-71)
  282. ACM
    Wu H, Tu C, Sun W, Zheng B, Su H and Wang W GLUE Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, (683-692)
  283. Pisani P, Lorena A and Carvalho A (2015). Adaptive Positive Selection for Keystroke Dynamics, Journal of Intelligent and Robotic Systems, 80:1, (277-293), Online publication date: 1-Oct-2015.
  284. Ring M, Otto F, Becker M, Niebler T, Landes D and Hotho A ConDist Proceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (251-266)
  285. Qiegen Liu , Liu P, Weisi Xie , Yuhao Wang and Dong Liang (2015). GcsDecolor: Gradient Correlation Similarity for Efficient Contrast Preserving Decolorization, IEEE Transactions on Image Processing, 24:9, (2889-2904), Online publication date: 1-Sep-2015.
  286. Pereira C and de Mello R (2015). Persistent homology for time series and spatial data clustering, Expert Systems with Applications: An International Journal, 42:15, (6026-6038), Online publication date: 1-Sep-2015.
  287. Seret A, Maldonado S and Baesens B (2015). Identifying next relevant variables for segmentation by using feature selection approaches, Expert Systems with Applications: An International Journal, 42:15, (6255-6266), Online publication date: 1-Sep-2015.
  288. Palamakumbure D, Flentje P and Stirling D (2015). Consideration of optimal pixel resolution in deriving landslide susceptibility zoning within the Sydney Basin, New South Wales, Australia, Computers & Geosciences, 82:C, (13-22), Online publication date: 1-Sep-2015.
  289. Melucci M Efficient Term Set Prediction Using the Bell-Wigner Inequality Proceedings of the 22nd International Symposium on String Processing and Information Retrieval - Volume 9309, (46-53)
  290. ACM
    Jawed M, Kaya M and Alhajj R Time Frame based Link Prediction in Directed Citation Networks Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1162-1168)
  291. ACM
    Kaya B and Poyraz M Finding Relations Between Diseases by Age-Series Based Supervised Link Prediction Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1097-1103)
  292. Hamed A, Wu X, Erickson R and Fandy T (2015). Twitter K-H networks in action, Journal of Biomedical Informatics, 56:C, (157-168), Online publication date: 1-Aug-2015.
  293. ACM
    Campello R, Moulavi D, Zimek A and Sander J (2015). Hierarchical Density Estimates for Data Clustering, Visualization, and Outlier Detection, ACM Transactions on Knowledge Discovery from Data, 10:1, (1-51), Online publication date: 27-Jul-2015.
  294. Amalaman P and Eick C Avalanche Proceedings of the 11th International Conference on Machine Learning and Data Mining in Pattern Recognition - Volume 9166, (296-310)
  295. Prajapat S and Thakur R Cryptic-Mining Proceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 9158, (699-711)
  296. Hilbrich M and Müller-Pfefferkorn R Cross-Correlation as Tool to Determine the Similarity of Series of Measurements for Big-Data Analysis Tasks Revised Selected Papers of the Second International Conference on Cloud Computing and Big Data - Volume 9106, (263-282)
  297. Zhi X and Fan J A New Algorithm for Discriminative Clustering and Its Maximum Entropy Extension Revised Selected Papers, Part II, of the 5th International Conference on Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques - Volume 9243, (422-432)
  298. Park J and Kim S Prediction of Package Chip Quality Using Fail Bit Count Data of the Probe Test Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (655-664)
  299. Chiu Y, Liu S, Huang H and Hong K Discovering Potential Victims Within Enterprise Network via Link Analysis Method Proceedings of the 28th International Conference on Current Approaches in Applied Artificial Intelligence - Volume 9101, (326-335)
  300. Joia P, Petronetto F and Nonato L (2015). Uncovering Representative Groups in Multidimensional Projections, Computer Graphics Forum, 34:3, (281-290), Online publication date: 1-Jun-2015.
  301. Raidou R, van der Heide U, Dinh C, Ghobadi G, Kallehauge J, Breeuwer M and Vilanova A (2015). Visual Analytics for the Exploration of Tumor Tissue Characterization, Computer Graphics Forum, 34:3, (11-20), Online publication date: 1-Jun-2015.
  302. ACM
    Gan J and Tao Y DBSCAN Revisited Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, (519-530)
  303. Vieira P and Lino N Multimedia Content Recommendation in Digital Convergence Environments Proceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 1, (103-110)
  304. ACM
    Zafarani R and Liu H (2015). Evaluation without ground truth in social media research, Communications of the ACM, 58:6, (54-60), Online publication date: 21-May-2015.
  305. Hassani M and Seidl T Internal Clustering Evaluation of Data Streams Revised Selected Papers of the PAKDD 2015 Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 9441, (198-209)
  306. Anava Y, Avigdor-Elgrabli N and Gamzu I Improved Theoretical and Practical Guarantees for Chromatic Correlation Clustering Proceedings of the 24th International Conference on World Wide Web, (55-65)
  307. ACM
    Murukannaiah P and Singh M (2015). Platys, ACM Transactions on Software Engineering and Methodology, 24:3, (1-32), Online publication date: 13-May-2015.
  308. ACM
    Messaoud M Dynamic Proceedings of the 30th Annual ACM Symposium on Applied Computing, (264-266)
  309. ACM
    van Bezu R, Borst S, Rijkse R, Verhagen J, Vandic D and Frasincar F Multi-component similarity method for web product duplicate detection Proceedings of the 30th Annual ACM Symposium on Applied Computing, (761-768)
  310. ACM
    Puppi Wanderley G and Paraiso E Learning folksonomies from task-oriented dialogues Proceedings of the 30th Annual ACM Symposium on Applied Computing, (360-367)
  311. Micheli E, Margaritis G and Anastasiadis S (2015). Permission-based Index Clustering for Secure Multi-User Search, Transactions on Data Privacy, 8:1, (29-53), Online publication date: 1-Apr-2015.
  312. Chang-Shing Lee , Mei-Hui Wang , Meng-Jhen Wu , Teytaud O and Shi-Jim Yen (2015). T2FS-Based Adaptive Linguistic Assessment System for Semantic Analysis and Human Performance Evaluation on Game of Go, IEEE Transactions on Fuzzy Systems, 23:2, (400-420), Online publication date: 1-Apr-2015.
  313. Santana V and Baranauskas M (2015). WELFIT, International Journal of Human-Computer Studies, 76:C, (40-49), Online publication date: 1-Apr-2015.
  314. Seo J, Han S, Lee S and Kim H (2015). Computer vision techniques for construction safety and health monitoring, Advanced Engineering Informatics, 29:2, (239-251), Online publication date: 1-Apr-2015.
  315. Hung C, Peng W and Lee W (2015). Clustering and aggregating clues of trajectories for mining trajectory patterns and routes, The VLDB Journal — The International Journal on Very Large Data Bases, 24:2, (169-192), Online publication date: 1-Apr-2015.
  316. Sharifnya R and Abadi M (2015). DFBotKiller, Digital Investigation: The International Journal of Digital Forensics & Incident Response, 12:C, (15-26), Online publication date: 1-Mar-2015.
  317. Abril D, Navarro-Arribas G and Torra V (2015). Spherical microaggregation, Computers and Security, 49:C, (28-44), Online publication date: 1-Mar-2015.
  318. Elish K, Shu X, Yao D, Ryder B and Jiang X (2015). Profiling user-trigger dependence for Android malware detection, Computers and Security, 49:C, (255-273), Online publication date: 1-Mar-2015.
  319. Do L, Yang H, Kim S, Lee G and Kim S (2015). A multi-voxel-activity-based feature selection method for human cognitive states classification by functional magnetic resonance imaging data, Cluster Computing, 18:1, (199-208), Online publication date: 1-Mar-2015.
  320. Fazendeiro P and Valente de Oliveira J (2015). Observer-Biased Fuzzy Clustering, IEEE Transactions on Fuzzy Systems, 23:1, (85-97), Online publication date: 1-Feb-2015.
  321. Latkowski T and Osowski S (2015). Data mining for feature selection in gene expression autism data, Expert Systems with Applications: An International Journal, 42:2, (864-872), Online publication date: 1-Feb-2015.
  322. Swiderski B, Osowski S, Kruk M and Kurek J (2015). Texture characterization based on the Kolmogorov-Smirnov distance, Expert Systems with Applications: An International Journal, 42:1, (503-509), Online publication date: 1-Jan-2015.
  323. El Salhi S, Coenen F, Dixon C and Khan M (2015). Predicting "springback" using 3D surface representation techniques, Expert Systems with Applications: An International Journal, 42:1, (79-93), Online publication date: 1-Jan-2015.
  324. Redondo R, Bueno G, Chung F, Nava R, Víctor Marcos J, Cristóbal G, Rodríguez T, Gonzalez-Porto A, Pardo C, Déniz O and Escalante-Ramírez B (2015). Pollen segmentation and feature evaluation for automatic classification in bright-field microscopy, Computers and Electronics in Agriculture, 110:C, (56-69), Online publication date: 1-Jan-2015.
  325. Jin G, Jeong Y and Yoon B (2015). Technology-driven roadmaps for identifying new product/market opportunities, Advanced Engineering Informatics, 29:1, (126-138), Online publication date: 1-Jan-2015.
  326. ACM
    Lin W and Su J Mining Association Rules with Range Support Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, (326-329)
  327. Baralis E, Cagliero L, Cerquitelli T, Chiusano S, Garza P, Grimaudo L and Pulvirenti F NEMICO Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, (503-504)
  328. Memarmoshrefi P, Zhang H and Hogrefe D Social insect-based sybil attack detection in mobile ad-hoc networks Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, (141-148)
  329. Faria C, Serra I and Girardi R (2014). A domain-independent process for automatic ontology population from text, Science of Computer Programming, 95:P1, (26-43), Online publication date: 1-Dec-2014.
  330. ACM
    Duan L, Street W, Liu Y, Xu S and Wu B (2014). Selecting the Right Correlation Measure for Binary Data, ACM Transactions on Knowledge Discovery from Data, 9:2, (1-28), Online publication date: 17-Nov-2014.
  331. ACM
    Zheng L, Li T and Ding C (2014). A Framework for Hierarchical Ensemble Clustering, ACM Transactions on Knowledge Discovery from Data, 9:2, (1-23), Online publication date: 17-Nov-2014.
  332. Chen Z, Son S, Hendrix W, Agrawal A, Liao W and Choudhary A NUMARCK Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, (733-744)
  333. ACM
    Mani S, Sankaranarayanan K, Sinha V and Devanbu P Panning requirement nuggets in stream of software maintenance tickets Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (678-688)
  334. ACM
    Higo Y and Kusumoto S How should we measure functional sameness from program source code? an exploratory study on Java methods Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (294-305)
  335. ACM
    Bosu A, Carver J, Hafiz M, Hilley P and Janni D Identifying the characteristics of vulnerable code changes: an empirical study Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (257-268)
  336. ACM
    Mazinanian D, Tsantalis N and Mesbah A Discovering refactoring opportunities in cascading style sheets Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (496-506)
  337. ACM
    Li H, Kulik L and Ramamohanarao K Spatio-temporal trajectory simplification for inferring travel paths Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (63-72)
  338. ACM
    Dean D, Nguyen H, Gu X, Zhang H, Rhee J, Arora N and Jiang G PerfScope Proceedings of the ACM Symposium on Cloud Computing, (1-13)
  339. ACM
    Li S, Schliep M and Hopper N Facet Proceedings of the 13th Workshop on Privacy in the Electronic Society, (163-172)
  340. Seret A, Verbraken T and Baesens B (2014). A new knowledge-based constrained clustering approach, Applied Soft Computing, 24:C, (316-327), Online publication date: 1-Nov-2014.
  341. Faria F, Perre P, Zucchi R, Jorge L, Lewinsohn T, Rocha A and Torres R (2014). Automatic identification of fruit flies (Diptera, Journal of Visual Communication and Image Representation, 25:7, (1516-1527), Online publication date: 1-Oct-2014.
  342. ACM
    Vacchi E, Cazzola W, Combemale B and Acher M Automating variability model inference for component-based language implementations Proceedings of the 18th International Software Product Line Conference - Volume 1, (167-176)
  343. ACM
    Song X, Zhang Q, Sekimoto Y and Shibasaki R Prediction of human emergency behavior and their mobility following large-scale disaster Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (5-14)
  344. Keltch B, Lin Y and Bayrak C (2014). Comparison of AI Techniques for Prediction of Liver Fibrosis in Hepatitis Patients, Journal of Medical Systems, 38:8, (1-8), Online publication date: 1-Aug-2014.
  345. ACM
    Lopes R, Pedrosa Silva R, Freitas A, Campelo F and Guimarães F A study on the configuration of migratory flows in island model differential evolution Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (1015-1022)
  346. ACM
    Ludwig S Clonal selection based fuzzy C-means algorithm for clustering Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, (105-112)
  347. Son S, Chen Z, Hendrix W, Agrawal A, Liao W and Choudhary A (2014). Data Compression for the Exascale Computing Era - Survey, Supercomputing Frontiers and Innovations: an International Journal, 1:2, (76-88), Online publication date: 9-Jul-2014.
  348. Barros R, Jaskowiak P, Cerri R and de Carvalho A (2014). A framework for bottom-up induction of oblique decision trees, Neurocomputing, 135:C, (3-12), Online publication date: 5-Jul-2014.
  349. Keramati A and Jafari-Marandi R (2014). Webpage clustering, Journal of Web Engineering, 13:3-4, (333-360), Online publication date: 1-Jul-2014.
  350. ACM
    Shi J, Mamoulis N, Wu D and Cheung D Density-based place clustering in geo-social networks Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, (99-110)
  351. ACM
    Kuo C, Lee M, Fu C, Ho Y and Chen L An in-depth study of forecasting household electricity demand using realistic datasets Proceedings of the 5th international conference on Future energy systems, (145-155)
  352. ACM
    Huo X, Ren B and Agrawal G A programming system for xeon phis with runtime SIMD parallelization Proceedings of the 28th ACM international conference on Supercomputing, (283-292)
  353. ACM
    Santos T, Lima A, Reis C and Reis R Automated support for human resource allocation in software process by cluster analysis Proceedings of the 4th International Workshop on Recommendation Systems for Software Engineering, (30-31)
  354. ACM
    Consoli S, Gangemi A, Nuzzolese A, Peroni S, Presutti V, Recupero D and Spampinato D Geolinked Open Data for the Municipality of Catania Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), (1-8)
  355. ACM
    Grechanik M, McMillan C, Dasgupta T, Poshyvanyk D and Gethers M Redacting sensitive information in software artifacts Proceedings of the 22nd International Conference on Program Comprehension, (314-325)
  356. ACM
    Yuan E, Esfahani N and Malek S Automated mining of software component interactions for self-adaptation Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (27-36)
  357. ACM
    Matragkas N, Williams J, Kolovos D and Paige R Analysing the 'biodiversity' of open source ecosystems: the GitHub case Proceedings of the 11th Working Conference on Mining Software Repositories, (356-359)
  358. ACM
    Licorish S and MacDonell S Personality profiles of global software developers Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, (1-10)
  359. Zhang X and Song Q (2014). Predicting the number of nearest neighbors for the k-NN classification algorithm, Intelligent Data Analysis, 18:3, (449-464), Online publication date: 1-May-2014.
  360. ACM
    Lu Y, Lu J, Cong G, Wu W and Shahabi C (2014). Efficient Algorithms and Cost Models for Reverse Spatial-Keyword k-Nearest Neighbor Search, ACM Transactions on Database Systems, 39:2, (1-46), Online publication date: 1-May-2014.
  361. Wang D, Amin M, Li S, Abdelzaher T, Kaplan L, Gu S, Pan C, Liu H, Aggarwal C, Ganti R, Wang X, Mohapatra P, Szymanski B and Le H Using humans as sensors Proceedings of the 13th international symposium on Information processing in sensor networks, (35-46)
  362. Tsikrika T and Diou C Multi-evidence User Group Discovery in Professional Image Search Proceedings of the 36th European Conference on IR Research on Advances in Information Retrieval - Volume 8416, (693-699)
  363. ACM
    Gaudencio M, Dantas A and Guerrero D Can computers compare student code solutions as well as teachers? Proceedings of the 45th ACM technical symposium on Computer science education, (21-26)
  364. Borysov P, Hannig J and Marron J (2014). Asymptotics of hierarchical clustering for growing dimension, Journal of Multivariate Analysis, 124, (465-479), Online publication date: 1-Feb-2014.
  365. ACM
    Ilie A and Welch G (2014). Online control of active camera networks for computer vision tasks, ACM Transactions on Sensor Networks, 10:2, (1-40), Online publication date: 1-Jan-2014.
  366. Gossen T, Kotzyba M and Nürnberger A (2014). Graph clusterings with overlaps, Neurocomputing, 123, (13-22), Online publication date: 1-Jan-2014.
  367. ACM
    Zheleva M, Schmitt P, Vigil M and Belding E Community detection in cellular network traces Proceedings of the Sixth International Conference on Information and Communications Technologies and Development: Notes - Volume 2, (183-186)
  368. Tang H, Liao S and Sun S (2013). A prediction framework based on contextual data to support Mobile Personalized Marketing, Decision Support Systems, 56:C, (234-246), Online publication date: 1-Dec-2013.
  369. ACM
    Fire M, Tenenboim-Chekina L, Puzis R, Lesser O, Rokach L and Elovici Y (2014). Computationally efficient link prediction in a variety of social networks, ACM Transactions on Intelligent Systems and Technology, 5:1, (1-25), Online publication date: 1-Dec-2013.
  370. Baralis E, Cagliero L, Jabeen S, Fiori A and Shah S (2013). Multi-document summarization based on the Yago ontology, Expert Systems with Applications: An International Journal, 40:17, (6976-6984), Online publication date: 1-Dec-2013.
  371. ACM
    Duarte D, Pereira A and Davis C Modeling, characterizing and recommendation in multimedia web content services Proceedings of the 19th Brazilian symposium on Multimedia and the web, (265-268)
  372. ACM
    Pillai K, Angryk R and Aydin B A filter-and-refine approach to mine spatiotemporal co-occurrences Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (104-113)
  373. Zhu S, Tang L and Li T (2013). Finding multiple global linear correlations in sparse and noisy data sets, Knowledge-Based Systems, 53, (40-50), Online publication date: 1-Nov-2013.
  374. Hiroyasu T, Fukushma A and Yamamoto U Extraction Algorithm of Similar Parts from Multiple Time-Series Data of Cerebral Blood Flow Proceedings of the International Conference on Brain and Health Informatics - Volume 8211, (138-146)
  375. ACM
    Tang L, Li T, Chen S and Zhu S Searching similar segments over textual event sequences Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (329-338)
  376. ACM
    Song C and Ge T Discovering and managing quantitative association rules Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (2429-2434)
  377. ACM
    Chen J, Liu S, Chen X, Gu Q and Chen D Empirical studies on feature selection for software fault prediction Proceedings of the 5th Asia-Pacific Symposium on Internetware, (1-4)
  378. ACM
    Larsen J, Sapiezynski P, Stopczynski A, Mørup M and Theodorsen R Crowds, bluetooth, and rock'n'roll Proceedings of the 1st ACM international workshop on Personal data meets distributed multimedia, (11-18)
  379. Silva L and Costa J Clustering, Noise Reduction and Visualization Using Features Extracted from the Self-Organizing Map Proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning --- IDEAL 2013 - Volume 8206, (242-251)
  380. Hu X, Zhang H, Wu X, Chen J, Xiao Y, Xue Y and Li T A Novel Approach for Customer Segmentation Based on Biclustering Web Information Systems Engineering – WISE 2013 Workshops, (302-312)
  381. Wagner C, Sedigh S and Hurson A Accurate and Efficient Search Prediction Using Fuzzy Matching and Outcome Feedback Proceedings of the 6th International Conference on Similarity Search and Applications - Volume 8199, (219-232)
  382. ACM
    Mathew G and Obradovic Z (2013). Distributed Privacy-Preserving Decision Support System for Highly Imbalanced Clinical Data, ACM Transactions on Management Information Systems, 4:3, (1-15), Online publication date: 1-Oct-2013.
  383. ACM
    Pattabiraman K, Sondhi P and Zhai C Exploiting Forum Thread Structures to Improve Thread Clustering Proceedings of the 2013 Conference on the Theory of Information Retrieval, (64-71)
  384. ACM
    Fung S, Lee E and Wong A Revealing Protein Structures by Co-Occurrence Clustering of Aligned Pattern Clusters Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics, (869-875)
  385. Nanni M, Trasarti R, Furletti B, Gabrielli L, Mede P, Bruijn J, Romph E and Bruil G Transportation Planning Based on GSM Traces Second International Workshop on Citizen in Sensor Networks - Volume 8313, (15-25)
  386. Chiu T, Hong C and Chiu Y Exploring Technology Opportunities in an Industry via Clustering Method and Association Analysis Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083, (593-602)
  387. ACM
    Baralis E, Cerquitelli T, Chiusano S, D'elia V, Molinari R and Susta D (2013). Early prediction of the highest workload in incremental cardiopulmonary tests, ACM Transactions on Intelligent Systems and Technology, 4:4, (1-20), Online publication date: 1-Sep-2013.
  388. ACM
    Rashidi P and Cook D (2013). COM, ACM Transactions on Intelligent Systems and Technology, 4:4, (1-20), Online publication date: 1-Sep-2013.
  389. Golfarelli M and Rizzi S Honey, I Shrunk the Cube Proceedings of the 17th East European Conference on Advances in Databases and Information Systems - Volume 8133, (176-189)
  390. ACM
    Malik S, Smith A, Hawes T, Papadatos P, Li J, Dunne C and Shneiderman B TopicFlow Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (720-726)
  391. ACM
    Li N and Gillet D Identifying influential scholars in academic social media platforms Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (608-614)
  392. ACM
    Chen H and Giles C ASCOS Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (442-449)
  393. ACM
    Srivastava P, Kapoor R and Gupta R Study of the effect of a rule based classifier modeled anti-corruption body in a neural network based environment Proceedings of the 6th ACM India Computing Convention, (1-9)
  394. ACM
    Narang P, Reddy J and Hota C Feature selection for detection of peer-to-peer botnet traffic Proceedings of the 6th ACM India Computing Convention, (1-9)
  395. ACM
    Wang Y, Zheng J, Liu X and Lang B Robust clustering for social annotated images Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service, (87-92)
  396. ACM
    Scripps J and Trefftz C Community finding within the community set space Proceedings of the 7th Workshop on Social Network Mining and Analysis, (1-9)
  397. ACM
    Tang L, Li T, Shwartz L, Pinel F and Grabarnik G An integrated framework for optimizing automatic monitoring systems in large IT infrastructures Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1249-1257)
  398. ACM
    Song X, Zhang Q, Sekimoto Y, Horanont T, Ueyama S and Shibasaki R Modeling and probabilistic reasoning of population evacuation during large-scale disaster Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1231-1239)
  399. ACM
    Zeng C, Jiang Y, Zheng L, Li J, Li L, Li H, Shen C, Zhou W, Li T, Duan B, Lei M and Wang P FIU-Miner Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1506-1509)
  400. ACM
    Warncke-Wang M, Cosley D and Riedl J Tell me more Proceedings of the 9th International Symposium on Open Collaboration, (1-10)
  401. ACM
    Schlegel B, Kiefer T, Kissinger T and Lehner W pcApriori Proceedings of the 25th International Conference on Scientific and Statistical Database Management, (1-12)
  402. Parra F and León E Unsupervised tagging of spanish lyrics dataset using clustering Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition, (130-143)
  403. Mhlanga F, Perry E, Wei C and Ng P Towards a predictive model architecture for current or emergent pandemic situations Proceedings of the 2013 Summer Computer Simulation Conference, (1-6)
  404. ACM
    Lucchese C, Orlando S, Perego R, Silvestri F and Tolomei G (2013). Discovering tasks from search engine query logs, ACM Transactions on Information Systems, 31:3, (1-43), Online publication date: 1-Jul-2013.
  405. Jaskowiak P, Campello R and Costa Filho I (2013). Proximity Measures for Clustering Gene Expression Microarray Data, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 10:4, (845-857), Online publication date: 1-Jul-2013.
  406. Zhou W and Zhang H Correlation range query Proceedings of the 14th international conference on Web-Age Information Management, (490-501)
  407. ACM
    Zhang W, Li X, Saxena S, Strojwas A and Rutenbar R Automatic clustering of wafer spatial signatures Proceedings of the 50th Annual Design Automation Conference, (1-6)
  408. Zhang Y, Meratnia N and Havinga P (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine, Ad Hoc Networks, 11:3, (1062-1074), Online publication date: 1-May-2013.
  409. Ferrari A, Gnesi S and Tolomei G Using clustering to improve the structure of natural language requirements documents Proceedings of the 19th international conference on Requirements Engineering: Foundation for Software Quality, (34-49)
  410. Gabrielsson P, König R and Johansson U Evolving hierarchical temporal memory-based trading models Proceedings of the 16th European conference on Applications of Evolutionary Computation, (213-222)
  411. Yin L, Ge Y, Xiao K, Wang X and Quan X (2013). Feature selection for high-dimensional imbalanced data, Neurocomputing, 105, (3-11), Online publication date: 1-Apr-2013.
  412. Lazaridis M, Axenopoulos A, Rafailidis D and Daras P (2013). Multimedia search and retrieval using multimodal annotation propagation and indexing techniques, Image Communication, 28:4, (351-367), Online publication date: 1-Apr-2013.
  413. Chung C, Hsu P and Huang S (2013). βP, Decision Support Systems, 55:1, (314-325), Online publication date: 1-Apr-2013.
  414. Hope D and Keller B MaxMax Proceedings of the 14th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part I, (368-381)
  415. ACM
    Mokarizadeh S, Küngas P and Matskin M Ontology acquisition from web service descriptions Proceedings of the 28th Annual ACM Symposium on Applied Computing, (325-332)
  416. ACM
    Angiulli F and Fassetti F (2013). Nearest Neighbor-Based Classification of Uncertain Data, ACM Transactions on Knowledge Discovery from Data, 7:1, (1-35), Online publication date: 1-Mar-2013.
  417. ACM
    He Y, Xin D, Ganti V, Rajaraman S and Shah N Crawling deep web entity pages Proceedings of the sixth ACM international conference on Web search and data mining, (355-364)
  418. ACM
    Hemmati H, Arcuri A and Briand L (2013). Achieving scalable model-based testing through test case diversity, ACM Transactions on Software Engineering and Methodology, 22:1, (1-42), Online publication date: 1-Feb-2013.
  419. Shen W, Wang Y, Bai X, Wang H and Jan Latecki L (2013). Shape clustering, Pattern Recognition, 46:2, (539-550), Online publication date: 1-Feb-2013.
  420. Szczuka M and Janusz A Semantic clustering of scientific articles using explicit semantic analysis Transactions on Rough Sets XVI, (83-102)
  421. Rahman M and Islam M CRUDAW Proceedings of the Tenth Australasian Data Mining Conference - Volume 134, (27-41)
  422. Son J, Noh Y, Song H and Park S Location Comparison through Geographical Topics Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01, (311-318)
  423. Xu L and Hung E Improving classification accuracy on uncertain data by considering multiple subclasses Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence, (743-754)
  424. Liang G and Zhang C A comparative study of sampling methods and algorithms for imbalanced time series classification Proceedings of the 25th Australasian joint conference on Advances in Artificial Intelligence, (637-648)
  425. ACM
    Carberry S, Elzer Schwartz S, Mccoy K, Demir S, Wu P, Greenbacker C, Chester D, Schwartz E, Oliver D and Moraes P (2013). Access to multimodal articles for individuals with sight impairments, ACM Transactions on Interactive Intelligent Systems, 2:4, (1-49), Online publication date: 1-Dec-2012.
  426. Ayuyev V, Thura A, Hlaing N and Loginova M (2012). The quick dynamic clustering method for mixed-type data, Automation and Remote Control, 73:12, (2083-2088), Online publication date: 1-Dec-2012.
  427. Chi C, Nick Street W, Robinson J and Crawford M (2012). Individualized patient-centered lifestyle recommendations, Journal of Biomedical Informatics, 45:6, (1164-1174), Online publication date: 1-Dec-2012.
  428. Chiu T, Hong C and Chiu Y Emerging technology exploration using rare information retrieval and link analysis Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part II, (540-549)
  429. Brax C and Dahlbom A A study of anomaly detection in data from urban sensor networks Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence, (185-196)
  430. ACM
    Taherkhani A, Korhonen A and Malmi L Automatic recognition of students' sorting algorithm implementations in a data structures and algorithms course Proceedings of the 12th Koli Calling International Conference on Computing Education Research, (83-92)
  431. Kanda J, Soares C, Hruschka E and de Carvalho A A meta-learning approach to select meta-heuristics for the traveling salesman problem using MLP-Based label ranking Proceedings of the 19th international conference on Neural Information Processing - Volume Part III, (488-495)
  432. Nekkaa M and Boughaci D Improving support vector machine using a stochastic local search for classification in datamining Proceedings of the 19th international conference on Neural Information Processing - Volume Part II, (168-175)
  433. ACM
    Athanasopoulos D, Zarras A and Vassiliadis P Service selection for happy users Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, (1-4)
  434. ACM
    Canavera K, Esfahani N and Malek S Mining the execution history of a software system to infer the best time for its adaptation Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, (1-11)
  435. ACM
    Krogh B, Andersen O and Torp K Trajectories for novel and detailed traffic information Proceedings of the 3rd ACM SIGSPATIAL International Workshop on GeoStreaming, (32-39)
  436. Li X, Cervantes J and Yu W (2012). Fast classification for large data sets via random selection clustering and Support Vector Machines, Intelligent Data Analysis, 16:6, (897-914), Online publication date: 1-Nov-2012.
  437. ACM
    Liu Z, Qiu X, Cao L and Huang X Discovering logical knowledge for deep question answering Proceedings of the 21st ACM international conference on Information and knowledge management, (1920-1924)
  438. ACM
    Gomes A and Pimentel M Media-based social interaction patterns Proceedings of the 2012 international workshop on Socially-aware multimedia, (37-42)
  439. ACM
    Kugaonkar R, Gangopadhyay A, Yesha Y, Joshi A, Yesha Y, Grasso M, Brady M and Rishe N Finding associations among SNPS for prostate cancer using collaborative filtering Proceedings of the ACM sixth international workshop on Data and text mining in biomedical informatics, (57-60)
  440. ACM
    Faruki P, Laxmi V, Gaur M and Vinod P Mining control flow graph as API call-grams to detect portable executable malware Proceedings of the Fifth International Conference on Security of Information and Networks, (130-137)
  441. ACM
    Moon J, Kim H, Choi H and Jeon S A support vector machine based classifier to extract abnormal features from breast magnetic resonance images Proceedings of the 2012 ACM Research in Applied Computation Symposium, (148-152)
  442. ACM
    Wöckl B, Yildizoglu U, Buber I, Aparicio Diaz B, Kruijff E and Tscheligi M Basic senior personas Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility, (25-32)
  443. ACM
    Singh A, Walenstein A and Lakhotia A Tracking concept drift in malware families Proceedings of the 5th ACM workshop on Security and artificial intelligence, (81-92)
  444. ACM
    Rekik Y, Roussel N and Grisoni L Mouvements pseudo-rigides pour des interactions multi-doigts plus flexibles Proceedings of the 2012 Conference on Ergonomie et Interaction homme-machine, (241-244)
  445. ACM
    Gomes A and Pimentel M Measuring media-based social interactions in online civicmobilization against corruption in Brazil Proceedings of the 18th Brazilian symposium on Multimedia and the web, (173-180)
  446. Woo H and Park C An efficient active learning method based on random sampling and backward deletion Proceedings of the third Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering, (683-691)
  447. Xu S, Wang Z, Li X and Cao R A novel cluster combination algorithm for document clustering Proceedings of the third Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering, (189-195)
  448. ACM
    Ahmadzadeh M and Mahmoudabadi E A feasibility study on using clustering algorithms in programming education research Proceedings of the 13th annual conference on Information technology education, (145-150)
  449. ACM
    Lin J and Hu J Nuclear localization signal prediction based on sequential pattern mining Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (536-538)
  450. ACM
    Dey S, Lim K, Atluri G, MacDonald A, Steinbach M and Kumar V A pattern mining based integrative framework for biomarker discovery Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine, (498-505)
  451. Cesario E and Talia D (2012). Distributed data mining patterns and services: an architecture and experiments, Concurrency and Computation: Practice & Experience, 24:15, (1751-1774), Online publication date: 1-Oct-2012.
  452. ACM
    Dean D, Nguyen H and Gu X UBL Proceedings of the 9th international conference on Autonomic computing, (191-200)
  453. Ensari T, Chorowski J and Zurada J Correntropy-Based document clustering via nonnegative matrix factorization Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part II, (347-354)
  454. ACM
    Turkay C, Parulek J and Hauser H Dual analysis of DNA microarrays Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, (1-8)
  455. ACM
    Hu Y, Milios E, Blustein J and Liu S Personalized document clustering with dual supervision Proceedings of the 2012 ACM symposium on Document engineering, (161-170)
  456. Ekanayake C, Dumas M, García-Bañuelos L, La Rosa M and ter Hofstede A Approximate clone detection in repositories of business process models Proceedings of the 10th international conference on Business Process Management, (302-318)
  457. Amelio A and Pizzuti C Analyzing Voting Behavior in Italian Parliament Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (140-146)
  458. Kursun O and Aytekin T Combining Spatial Proximity and Temporal Continuity for Learning Invariant Representations Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (871-873)
  459. ACM
    Tran D, Ngo D and Do P An information content based partitioning method for the anatomical ontology matching task Proceedings of the 3rd Symposium on Information and Communication Technology, (272-281)
  460. ACM
    Nguyen S, Jaśkiewicz G, Świeboda W and Nguyen H Enhancing search result clustering with semantic indexing Proceedings of the 3rd Symposium on Information and Communication Technology, (71-80)
  461. ACM
    Faruki P, Laxmi V, Gaur M and Vinod P Behavioural detection with API call-grams to identify malicious PE files Proceedings of the First International Conference on Security of Internet of Things, (85-91)
  462. ACM
    Zhang Y, Peng Y, Li J, Kou G and Shi Y An ensemble clustering model for mining concept drifting stream data in emergency management Proceedings of the Data Mining and Intelligent Knowledge Management Workshop, (1-8)
  463. ACM
    Yuan Q, Cong G, Sun A, Lin C and Thalmann N Category hierarchy maintenance Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, (791-800)
  464. ACM
    Wu Z, Wu J, Cao J and Tao D HySAD Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (985-993)
  465. ACM
    Tang L, Li T and Shwartz L Discovering lag intervals for temporal dependencies Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (633-641)
  466. ACM
    Tsung C, Ho H and Lee S Sponsored search auction without bias Proceedings of the 14th Annual International Conference on Electronic Commerce, (27-34)
  467. Herrera M, Izquierdo J, Pérez-García R and Montalvo I (2012). Multi-agent adaptive boosting on semi-supervised water supply clusters, Advances in Engineering Software, 50:C, (131-136), Online publication date: 1-Aug-2012.
  468. Gong Y, Beck J and Ruiz C Modeling multiple distributions of student performances to improve predictive accuracy Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization, (102-113)
  469. Staroszczyk T, Osowski S and Markiewicz T Comparative analysis of feature selection methods for blood cell recognition in leukemia Proceedings of the 8th international conference on Machine Learning and Data Mining in Pattern Recognition, (467-481)
  470. Nagy G and Buza K SOHAC Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (38-51)
  471. Kirshners A, Parshutin S and Leja M Research on application of data mining methods to diagnosing gastric cancer Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects, (24-37)
  472. Wang K, Huai Y, Lee R, Wang F, Zhang X and Saltz J (2012). Accelerating pathology image data cross-comparison on CPU-GPU hybrid systems, Proceedings of the VLDB Endowment, 5:11, (1543-1554), Online publication date: 1-Jul-2012.
  473. Kuo R, Syu Y, Chen Z and Tien F (2012). Integration of particle swarm optimization and genetic algorithm for dynamic clustering, Information Sciences: an International Journal, 195, (124-140), Online publication date: 1-Jul-2012.
  474. Tsai H, Chang B and Lin X (2012). Using decision tree, particle swarm optimization, and support vector regression to design a median-type filter with a 2-level impulse detector for image enhancement, Information Sciences: an International Journal, 195, (103-123), Online publication date: 1-Jul-2012.
  475. Prasad D, Quek C and Leung M A precise ellipse fitting method for noisy data Proceedings of the 9th international conference on Image Analysis and Recognition - Volume Part I, (253-260)
  476. Tojo S and Hirata K Structural Similarity Based on Time-Span Tree Revised Selected Papers of the 9th International Symposium on From Sounds to Music and Emotions - Volume 7900, (400-421)
  477. Pereira T, Angeloni M, Simões F and Silva J Video-Based face verification with local binary patterns and SVM using GMM supervectors Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part I, (240-252)
  478. Versaci F and Pingali K Processor allocation for optimistic parallelization of irregular programs Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part I, (1-14)
  479. Kühn E, Marek A, Scheller T, Sesum-Cavic V, Vögler M and Craß S A space-based generic pattern for self-initiative load clustering agents Proceedings of the 14th international conference on Coordination Models and Languages, (230-244)
  480. ACM
    Bock J, Lösch U and Wang H Automatic reasoner selection using machine learning Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics, (1-12)
  481. Howles T (2012). Emphasizing ethics and privacy preservation in an undergraduate data mining course, Journal of Computing Sciences in Colleges, 27:6, (121-127), Online publication date: 1-Jun-2012.
  482. ACM
    Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F (2012). An Efficient Rigorous Approach for Identifying Statistically Significant Frequent Itemsets, Journal of the ACM, 59:3, (1-22), Online publication date: 1-Jun-2012.
  483. Paiva J, Schwartz W, Pedrini H and Minghim R (2012). Semi-Supervised Dimensionality Reduction based on Partial Least Squares for Visual Analysis of High Dimensional Data, Computer Graphics Forum, 31:3pt4, (1345-1354), Online publication date: 1-Jun-2012.
  484. Poco J, Eler D, Paulovich F and Minghim R (2012). Employing 2D Projections for Fast Visual Exploration of Large Fiber Tracking Data, Computer Graphics Forum, 31:3pt2, (1075-1084), Online publication date: 1-Jun-2012.
  485. Teow K, El-Darzi E, Foo C, Jin X and Sim J (2012). Intelligent Analysis of Acute Bed Overflow in a Tertiary Hospital in Singapore, Journal of Medical Systems, 36:3, (1873-1882), Online publication date: 1-Jun-2012.
  486. Jadalla A and Elnagar A A plagiarism detection system for arabic text-based documents Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics, (145-153)
  487. Wang G and Song Q Selecting feature subset via constraint association rules Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II, (304-321)
  488. Hassan M and Karim A Clustering and understanding documents via discrimination information maximization Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (566-577)
  489. Fu Z, Zhou J, Christen P and Boot M Multiple instance learning for group record linkage Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (171-182)
  490. ACM
    Pérez A and Guzmán E An approach to the risk analysis of diabetes mellitus type 2 in a health care provider entity of Colombia using business intelligence Proceedings of the 6th Euro American Conference on Telematics and Information Systems, (49-56)
  491. Belohlavek R and Trnecka M Basic level of concepts in formal concept analysis Proceedings of the 10th international conference on Formal Concept Analysis, (28-44)
  492. Balan A, Traina A, Ribeiro M, Marques P and Traina Jr. C (2012). Smart histogram analysis applied to the skull-stripping problem in T1-weighted MRI, Computers in Biology and Medicine, 42:5, (509-522), Online publication date: 1-May-2012.
  493. Khan M, Nawab R and Gotoh Y Natural language descriptions of visual scenes Proceedings of the Joint Workshop on Exploiting Synergies between Information Retrieval and Machine Translation (ESIRMT) and Hybrid Approaches to Machine Translation (HyTra), (38-47)
  494. ACM
    Kamali S, Apacible J and Hosseinkashi Y Answering math queries with search engines Proceedings of the 21st International Conference on World Wide Web, (43-52)
  495. ACM
    Nickel M, Tresp V and Kriegel H Factorizing YAGO Proceedings of the 21st international conference on World Wide Web, (271-280)
  496. ACM
    Wang D, Kaplan L, Le H and Abdelzaher T On truth discovery in social sensing Proceedings of the 11th international conference on Information Processing in Sensor Networks, (233-244)
  497. ACM
    Jong C and Gligor V Private communication detection Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, (75-86)
  498. Liang Z, Jia Y and Zhou B Adaptive topic community tracking in social network Proceedings of the 14th Asia-Pacific international conference on Web Technologies and Applications, (484-495)
  499. Huang Z and Kumar A (2012). A Study of Quality and Accuracy Trade-offs in Process Mining, INFORMS Journal on Computing, 24:2, (311-327), Online publication date: 1-Apr-2012.
  500. ACM
    Gomes A and da Graça Campos Pimentel M A media-based social interactions analysis procedure Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1018-1024)
  501. ACM
    Karakasidis A and Verykios V Reference table based k-anonymous private blocking Proceedings of the 27th Annual ACM Symposium on Applied Computing, (859-864)
  502. ACM
    Chen H, Gou L, Zhang X and Giles C Discovering missing links in networks using vertex similarity measures Proceedings of the 27th Annual ACM Symposium on Applied Computing, (138-143)
  503. ACM
    Kerschbaum F Collusion-resistant outsourcing of private set intersection Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1451-1456)
  504. ACM
    Ferrari A, Gnesi S and Tolomei G A clustering-based approach for discovering flaws in requirements specifications Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1043-1050)
  505. ACM
    Liu F, Ting K and Zhou Z (2012). Isolation-Based Anomaly Detection, ACM Transactions on Knowledge Discovery from Data, 6:1, (1-39), Online publication date: 1-Mar-2012.
  506. ACM
    Ienco D, Pensa R and Meo R (2012). From Context to Distance, ACM Transactions on Knowledge Discovery from Data, 6:1, (1-25), Online publication date: 1-Mar-2012.
  507. ACM
    van Zwol R and Garcia Pueyo L Spatially-aware indexing for image object retrieval Proceedings of the fifth ACM international conference on Web search and data mining, (3-12)
  508. ACM
    Zhang Y and Li T (2012). DClusterE, ACM Transactions on Intelligent Systems and Technology, 3:2, (1-24), Online publication date: 1-Feb-2012.
  509. Zolfaghar K and Aghaie A (2012). A syntactical approach for interpersonal trust prediction in social web applications, Knowledge-Based Systems, 26, (93-102), Online publication date: 1-Feb-2012.
  510. Zhu B, He C, Liatsis P and Li X (2012). A GMDH-based fuzzy modeling approach for constructing TS model, Fuzzy Sets and Systems, 189:1, (19-29), Online publication date: 1-Feb-2012.
  511. ACM
    Bakker J, Holenderski L, Kocielnik R, Pechenizkiy M and Sidorova N Stess@Work Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, (673-678)
  512. Sug H Improving the prediction accuracy of liver disorder disease with oversampling Proceedings of the 6th WSEAS international conference on Computer Engineering and Applications, and Proceedings of the 2012 American conference on Applied Mathematics, (331-335)
  513. Wong R, Moh T and Moh M Efficient semi-supervised learning bittorrent traffic detection - an extended summary Proceedings of the 13th international conference on Distributed Computing and Networking, (540-543)
  514. Verma R and Chen P (2012). A data mining hypertextbook, Journal of Computing Sciences in Colleges, 27:3, (22-28), Online publication date: 1-Jan-2012.
  515. Vanacken L, Pinho R, Sijbers J and Coninx K (2012). Force feedback to assist active contour modelling for tracheal stenosis segmentation, Advances in Human-Computer Interaction, 2012, (5-5), Online publication date: 1-Jan-2012.
  516. David G and Averbuch A (2012). SpectralCAT, Pattern Recognition, 45:1, (416-433), Online publication date: 1-Jan-2012.
  517. Razmjooy N, Mousavi B and Soleymani F (2012). A real-time mathematical computer method for potato inspection using machine vision, Computers & Mathematics with Applications, 63:1, (268-279), Online publication date: 1-Jan-2012.
  518. Kumar D, Murthy J, Satapathy S and Pullela S A study of decision tree induction for data stream mining using boosting genetic programming classifier Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part I, (315-322)
  519. Whelan M, Le-Khac N and Kechadi M A new hybrid clustering method for reducing very large spatio-temporal dataset Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I, (69-82)
  520. Łukasik S and Kulczycki P An algorithm for sample and data dimensionality reduction using fast simulated annealing Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I, (152-161)
  521. Gupta C, Dayal U, Wang S and Mehta A Live BI Proceedings of the 7th international conference on Databases in Networked Information Systems, (270-285)
  522. Huang Y, Seck M and Verbraeck A From data to simulation models Proceedings of the Winter Simulation Conference, (3724-3734)
  523. ACM
    Mikroyannid E, Iannone L, Stevens R and Rector A Inspecting regularities and irregularities in SNOMED-CT Proceedings of the 4th International Workshop on Semantic Web Applications and Tools for the Life Sciences, (76-83)
  524. ACM
    Nadji Y, Antonakakis M, Perdisci R and Lee W Understanding the prevalence and use of alternative plans in malware with network games Proceedings of the 27th Annual Computer Security Applications Conference, (1-10)
  525. Rahman A and Islam Z Seed-detective Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (211-220)
  526. Fu Z, Christen P and Boot M A supervised learning and group linking method for historical census household linkage Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (153-162)
  527. Barsky M, Kim S, Weninger T and Han J (2011). Mining flipping correlations from large datasets with taxonomies, Proceedings of the VLDB Endowment, 5:4, (370-381), Online publication date: 1-Dec-2011.
  528. ACM
    Dalal A (2011). User-perceived quality assessment of streaming media using reduced feature sets, ACM Transactions on Internet Technology, 11:2, (1-32), Online publication date: 1-Dec-2011.
  529. ACM
    Trunfio G, D’Ambrosio D, Rongo R, Spataro W and Di Gregorio S (2011). A New Algorithm for Simulating Wildfire Spread through Cellular Automata, ACM Transactions on Modeling and Computer Simulation, 22:1, (1-26), Online publication date: 1-Dec-2011.
  530. ACM
    Youssif A, Ghalwash A and Amer E HSWS Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (212-219)
  531. Parvin H, Minaei-Bidgoli B and Parvin S An accumulative points/votes based approach for feature selection Proceedings of the 16th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, (399-408)
  532. Ahmed I and Lhee K (2011). Classification of packet contents for malware detection, Journal in Computer Virology, 7:4, (279-295), Online publication date: 1-Nov-2011.
  533. Cule B, Goethals B, Tassenoy S and Verboven S Mining train delays Proceedings of the 10th international conference on Advances in intelligent data analysis X, (113-124)
  534. Kaosar G, Paulet R and Yi X Optimized two party privacy preserving association rule mining using fully homomorphic encryption Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I, (360-370)
  535. ACM
    Wattanakitrungroj N and Lursinsap C Memory-less unsupervised clustering for data streaming by versatile ellipsoidal function Proceedings of the 20th ACM international conference on Information and knowledge management, (967-972)
  536. ACM
    Tang L, Li T and Perng C LogSig Proceedings of the 20th ACM international conference on Information and knowledge management, (785-794)
  537. Mikroyannidi E, Iannone L, Stevens R and Rector A Inspecting regularities in ontology design using clustering Proceedings of the 10th international conference on The semantic web - Volume Part I, (438-453)
  538. Szczuka M, Janusz A and Herba K Clustering of rough set related documents with use of knowledge from DBpedia Proceedings of the 6th international conference on Rough sets and knowledge technology, (394-403)
  539. Hatamlou A, Abdullah S and Nezamabadi-Pour H Application of gravitational search algorithm on data clustering Proceedings of the 6th international conference on Rough sets and knowledge technology, (337-346)
  540. Al-Mulla R and Al Aghbari Z (2011). Incremental Algorithm for Discovering Frequent Subsequences in Multiple Data Streams, International Journal of Data Warehousing and Mining, 7:4, (1-20), Online publication date: 1-Oct-2011.
  541. ACM
    Sang J and Xu C (2011). Browse by chunks, ACM Transactions on Multimedia Computing, Communications, and Applications, 7S:1, (1-18), Online publication date: 1-Oct-2011.
  542. ACM
    Liao Z, Jiang D, Chen E, Pei J, Cao H and Li H (2011). Mining Concept Sequences from Large-Scale Search Logs for Context-Aware Query Suggestion, ACM Transactions on Intelligent Systems and Technology, 3:1, (1-40), Online publication date: 1-Oct-2011.
  543. Huang T, Chen L, Liu X and Cai Y (2011). Predicting triplet of transcription factor - mediating enzyme - target gene by functional profiles, Neurocomputing, 74:17, (3677-3681), Online publication date: 1-Oct-2011.
  544. Rashidi L, Hashemi S and Hamzeh A Anomaly detection in categorical datasets using bayesian networks Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II, (610-619)
  545. Parsa S, PorShokooh H, Teymouri S and Vahidi-Asl M A heuristic test data generation approach for program fault localization Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part I, (236-243)
  546. Esmaeili L, Nasiri M and Minaei-Bidgoli B Personalizing group recommendation to social network users Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I, (124-133)
  547. Vogel P and Mattfeld D Strategic and operational planning of bike-sharing systems by data mining Proceedings of the Second international conference on Computational logistics, (127-141)
  548. ACM
    Cardoso E, Jabour I, Laber E, Rodrigues R and Cardoso P An efficient language-independent method to extract content from news webpages Proceedings of the 11th ACM symposium on Document engineering, (121-128)
  549. Quesada L, Berzal F and Cubero J A language specification tool for model-based parsing Proceedings of the 12th international conference on Intelligent data engineering and automated learning, (50-57)
  550. Phillips J, Raman P and Venkatasubramanian S Generating a diverse set of high-quality clusterings Proceedings of the 2nd International Conference on Discovering, Summarizing and Using Multiple Clusterings - Volume 772, (80-91)
  551. Kim S, Barsky M and Han J Efficient mining of top correlated patterns based on null-invariant measures Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part II, (177-192)
  552. Almeida H, Guedes D, Meira W and Zaki M Is there a best quality metric for graph clusters? Proceedings of the 2011 European conference on Machine learning and knowledge discovery in databases - Volume Part I, (44-59)
  553. ACM
    Beck F and Diehl S On the congruence of modularity and code coupling Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, (354-364)
  554. Kim S, Barsky M and Han J Efficient mining of top correlated patterns based on null-invariant measures Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, (177-192)
  555. Almeida H, Guedes D, Meira W and Zaki M Is there a best quality metric for graph clusters? Proceedings of the 2011th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part I, (44-59)
  556. Campan A, Cooper N and Truta T On-the-fly generalization hierarchies for numerical attributes revisited Proceedings of the 8th VLDB international conference on Secure data management, (18-32)
  557. Folino F and Pizzuti C Combining markov models and association analysis for disease prediction Proceedings of the Second international conference on Information technology in bio- and medical informatics, (39-52)
  558. Alshukri A, Coenen F and Zito M Incremental web-site boundary detection using random walks Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (414-427)
  559. Bouguessa M A practical approach for clustering transaction data Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (265-279)
  560. Danylenko A, Lundberg J and Löwe W Decisions Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition, (31-45)
  561. Kashyap S, Lee M and Hsu W Similar subsequence search in time series databases Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I, (232-246)
  562. Shambour Q and Lu J Government-to-business personalized e-services using semantic-enhanced recommender system Proceedings of the Second international conference on Electronic government and the information systems perspective, (197-211)
  563. Zheng S, Shae Z, Zhang X, Jamjoom H and Fong L Analysis and modeling of social influence in high performance computing workloads Proceedings of the 17th international conference on Parallel processing - Volume Part I, (193-204)
  564. Shambour Q and Lu J A Hybrid Multi-criteria Semantic-Enhanced Collaborative Filtering Approach for Personalized Recommendations Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01, (71-78)
  565. ACM
    Das P and Banerjee A Meta optimization and its application to portfolio selection Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (1163-1171)
  566. ACM
    Simon G, Kumar V and Li P A simple statistical model and association rule filtering for classification Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (823-831)
  567. ACM
    Simon G, Li P, Jack C and Vemuri P Understanding atrophy trajectories in alzheimer's disease using association rules on MRI images Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (369-376)
  568. ACM
    Mukerjee K, Porter T and Gherman S Linear scale semantic mining algorithms in microsoft SQL server's semantic platform Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (213-221)
  569. ACM
    Calais Guerra P, Veloso A, Meira W and Almeida V From bias to opinion Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, (150-158)
  570. ACM
    Gou L, You F, Guo J, Wu L and Zhang X SFViz Proceedings of the 2011 Visual Information Communication - International Symposium, (1-10)
  571. Kanda J, Carvalho A, Hruschka E and Soares C (2011). Selection of algorithms to solve traveling salesman problems using meta-learning, International Journal of Hybrid Intelligent Systems, 8:3, (117-128), Online publication date: 1-Aug-2011.
  572. Yin M, Hu Y, Yang F, Li X and Gu W (2011). A novel hybrid K-harmonic means and gravitational search algorithm approach for clustering, Expert Systems with Applications: An International Journal, 38:8, (9319-9324), Online publication date: 1-Aug-2011.
  573. ACM
    Barros R, Basgalupp M, de Carvalho A and Freitas A Towards the automatic design of decision tree induction algorithms Proceedings of the 13th annual conference companion on Genetic and evolutionary computation, (567-574)
  574. Vrotsou K and Forsell C A qualitative study of similarity measures in event-based data Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I, (170-179)
  575. ACM
    Mithal V, Garg A, Boriah S, Steinbach M, Kumar V, Potter C, Klooster S and Castilla-Rubio J (2011). Monitoring global forest cover using data mining, ACM Transactions on Intelligent Systems and Technology, 2:4, (1-24), Online publication date: 1-Jul-2011.
  576. Weng C (2011). Mining fuzzy specific rare itemsets for education data, Knowledge-Based Systems, 24:5, (697-708), Online publication date: 1-Jul-2011.
  577. Sebastian Y and Then P (2011). Domain-driven KDD for mining functionally novel rules and linking disjoint medical hypotheses, Knowledge-Based Systems, 24:5, (609-620), Online publication date: 1-Jul-2011.
  578. Figueiredo F, Rocha L, Couto T, Salles T, Gonçalves M and Meira Jr. W (2011). Word co-occurrence features for text classification, Information Systems, 36:5, (843-858), Online publication date: 1-Jul-2011.
  579. dos Santos J, Heuser C, Moreira V and Wives L (2011). Automatic threshold estimation for data matching applications, Information Sciences: an International Journal, 181:13, (2685-2699), Online publication date: 1-Jul-2011.
  580. Angryk R, Hossain M and Norick B Semantically-guided clustering of text documents via frequent subgraphs discovery Proceedings of the 19th international conference on Foundations of intelligent systems, (407-417)
  581. ACM
    Chen H, Gou L, Zhang X and Giles C Capturing missing edges in social networks using vertex similarity Proceedings of the sixth international conference on Knowledge capture, (195-196)
  582. Greenbacker C, Wu P, Carberry S, McCoy K and Elzer S Abstractive summarization of line graphs from popular media Proceedings of the Workshop on Automatic Summarization for Different Genres, Media, and Languages, (41-48)
  583. Shoemaker L and Hall L Anomaly detection using ensembles Proceedings of the 10th international conference on Multiple classifier systems, (6-15)
  584. ACM
    Chen H, Gou L, Zhang X and Giles C CollabSeer Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries, (231-240)
  585. ACM
    Lu J, Lu Y and Cong G Reverse spatial and textual k nearest neighbor search Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (349-360)
  586. Aguiar-Pulido V, Seoane J, Munteanu C and Pazos A SNP-Schizo Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part II, (252-259)
  587. ACM
    Xu Q, Huang J, Wang Z, Qian F, Gerber A and Mao Z (2011). Cellular data network infrastructure characterization and implication on mobile content placement, ACM SIGMETRICS Performance Evaluation Review, 39:1, (277-288), Online publication date: 7-Jun-2011.
  588. ACM
    Xu Q, Huang J, Wang Z, Qian F, Gerber A and Mao Z Cellular data network infrastructure characterization and implication on mobile content placement Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, (317-328)
  589. ACM
    Ge Y and Qiu Q Dynamic thermal management for multimedia applications using machine learning Proceedings of the 48th Design Automation Conference, (95-100)
  590. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X The tao of parallelism in algorithms Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, (12-25)
  591. ACM
    Pingali K, Nguyen D, Kulkarni M, Burtscher M, Hassaan M, Kaleem R, Lee T, Lenharth A, Manevich R, Méndez-Lojo M, Prountzos D and Sui X (2011). The tao of parallelism in algorithms, ACM SIGPLAN Notices, 46:6, (12-25), Online publication date: 4-Jun-2011.
  592. Turkay C, Parulek J, Reuter N and Hauser H Interactive visual analysis of temporal cluster structures Proceedings of the 13th Eurographics / IEEE - VGTC conference on Visualization, (711-720)
  593. Rabuñal J, Puertas J, Rivero D, Fraga I, Cea L and Garrido M Genetic programming for prediction of water flow and transport of solids in a basin Proceedings of the 4th international conference on Interplay between natural and artificial computation: new challenges on bioinspired applications - Volume Part II, (223-232)
  594. Zdenka P, Petr S and Radek S Data analysis Proceedings of the 13th WSEAS international conference on Automatic control, modelling & simulation, (201-206)
  595. ACM
    Tatar A, Leguay J, Antoniadis P, Limbourg A, de Amorim M and Fdida S Predicting the popularity of online articles based on user comments Proceedings of the International Conference on Web Intelligence, Mining and Semantics, (1-8)
  596. Anand R and Reddy C Graph-based clustering with constraints Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part II, (51-62)
  597. Steinbach M, Yu H, Fang G and Kumar V Using constraints to generate and explore higher order discriminative patterns Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (338-350)
  598. Xiong T, Wang S, Mayers A and Monga E Semi-supervised parameter-free divisive hierarchical clustering of categorical data Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (265-276)
  599. Tomašev N, Radovanovič M, Mladenič D and Ivanovič M The role of hubness in clustering high-dimensional data Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (183-195)
  600. Dai B and Hsu S An instance selection algorithm based on reverse nearest neighbor Proceedings of the 15th Pacific-Asia conference on Advances in knowledge discovery and data mining - Volume Part I, (1-12)
  601. ACM
    Peng X, Xing Z, Tan X, Yu Y and Zhao W Iterative context-aware feature location (NIER track) Proceedings of the 33rd International Conference on Software Engineering, (900-903)
  602. ACM
    Bird C, Zimmermann T and Teterev A A theory of branches as goals and virtual teams Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering, (53-56)
  603. Naïja Y and Blibech K HS-measure Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (274-280)
  604. Schmidt C (2011). Lessons learned in the design of an undergraduate data mining course, Journal of Computing Sciences in Colleges, 26:5, (189-195), Online publication date: 1-May-2011.
  605. ACM
    Turkay C, Parulek J, Reuter N and Hauser H Integrating cluster formation and cluster evaluation in interactive visual analysis Proceedings of the 27th Spring Conference on Computer Graphics, (77-86)
  606. Chiu T, Hong C and Chiu Y To propose strategic suggestions for companies via IPC classification and association analysis Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I, (218-227)
  607. Sug H Using quick decision tree algorithm to find better RBF networks Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I, (207-217)
  608. Cerquitelli T, Cagliero L and Garza P (2011). Semi-Automatic Ontology Construction by Exploiting Functional Dependencies and Association Rules, International Journal on Semantic Web & Information Systems, 7:2, (1-22), Online publication date: 1-Apr-2011.
  609. Abbasimehr H, Tarokh M and Setak M (2011). Determination of Algorithms Making Balance Between Accuracy and Comprehensibility in Churn Prediction Setting, International Journal of Information Retrieval Research, 1:2, (39-54), Online publication date: 1-Apr-2011.
  610. ACM
    Ge Y, Xiong H, Zhou W, Li S and Sahoo R (2011). Multifocal learning for customer problem analysis, ACM Transactions on Intelligent Systems and Technology, 2:3, (1-22), Online publication date: 1-Apr-2011.
  611. ACM
    Saray Villamizar J, Encelle B, Prié Y and Champin P An adaptive videos enrichment system based on decision trees for people with sensory disabilities Proceedings of the International Cross-Disciplinary Conference on Web Accessibility, (1-4)
  612. ACM
    He Y and Xin D SEISA Proceedings of the 20th international conference on World wide web, (427-436)
  613. ACM
    Heinen M and Engel P Incremental feature-based mapping from sonar data using Gaussian mixture models Proceedings of the 2011 ACM Symposium on Applied Computing, (1370-1375)
  614. Potharaju R, Seibert J, Fahmy S and Nita-Rotaru C Omnify Proceedings of the 12th international conference on Passive and active measurement, (122-132)
  615. ACM
    Schwarzer S, Peschlow P, Pustina L and Martini P Automatic estimation of performance requirements for software tasks of mobile devices Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering, (347-358)
  616. ACM
    Niemann K, Schmitz H, Scheffel M and Wolpers M Usage contexts for object similarity Proceedings of the 1st International Conference on Learning Analytics and Knowledge, (81-85)
  617. ACM
    Gunisetti L Outlier detection and visualization of large datasets Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (522-524)
  618. Kaosar M, Paulet R and Yi X Secure two-party association rule mining Proceedings of the Ninth Australasian Information Security Conference - Volume 116, (15-22)
  619. Danesh M, Naghibzadeh M, Totonchi M, Danesh M, Minaei B and Shirgahi H Data clustering based on an efficient hybrid of K-harmonic means, PSO and GA Transactions on computational collective intelligence IV, (125-140)
  620. Puri C and Kumar N Projected Gustafson-Kessel clustering algorithm and its convergence Transactions on rough sets XIV, (159-182)
  621. Reichert M, Rinderle-Ma S and Jurisch M (2011). On Utilizing Web Service Equivalence for Supporting the Composition Life Cycle, International Journal of Web Services Research, 8:1, (41-67), Online publication date: 1-Jan-2011.
  622. Nafarrate A, Fowler J and Wu T Bi-criteria analysis of ambulance diversion policies Proceedings of the Winter Simulation Conference, (2315-2326)
  623. Horta D and Campello R (2010). Evolutionary clustering of relational data, International Journal of Hybrid Intelligent Systems, 7:4, (261-281), Online publication date: 1-Dec-2010.
  624. Abbes T, Bouhoula A and Rusinowitch M (2010). Efficient decision tree for protocol analysis in intrusion detection, International Journal of Security and Networks, 5:4, (220-235), Online publication date: 1-Dec-2010.
  625. ACM
    Zage D and Nita-Rotaru C (2010). Robust Decentralized Virtual Coordinate Systems in Adversarial Environments, ACM Transactions on Information and System Security, 13:4, (1-34), Online publication date: 1-Dec-2010.
  626. Imam T and Tickle K Class information adapted kernel for support vector machine Proceedings of the 17th international conference on Neural information processing: models and applications - Volume Part II, (116-123)
  627. Le-Khac N, Bue M, Whelan M and Kechadi M A clustering-based data reduction for very large spatio-temporal datasets Proceedings of the 6th international conference on Advanced data mining and applications - Volume Part II, (43-54)
  628. Chiu T, Hong C, Wang L and Chiu Y To construct a technology roadmap for technical trend recognition on thin-film solar cell Proceedings of the 2010 international conference on New Frontiers in Artificial Intelligence, (253-262)
  629. ACM
    Rashidi P and Cook D Mining and monitoring patterns of daily routines for assisted living in real world settings Proceedings of the 1st ACM International Health Informatics Symposium, (336-345)
  630. Chiu T, Hong C and Chiu Y Trend detection on thin-film solar cell technology using cluster analysis and modified data crystallization Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI, (152-161)
  631. Engel P and Heinen M Concept formation using incremental Gaussian mixture models Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications, (128-135)
  632. ACM
    de Moraes A and Bastos L Framework of integration for collaboration and spatial data mining among heterogeneous sources in the web Proceedings of the 1st ACM SIGSPATIAL International Workshop on Data Mining for Geoinformatics, (19-28)
  633. ACM
    Quercini G, Samet H, Sankaranarayanan J and Lieberman M Determining the spatial reader scopes of news sources using local lexicons Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, (43-52)
  634. Li H and Han Z (2010). Catch me if you can, IEEE Transactions on Wireless Communications, 9:11, (3554-3565), Online publication date: 1-Nov-2010.
  635. ACM
    Sun A and Bhowmick S Quantifying tag representativeness of visual content of social images Proceedings of the 18th ACM international conference on Multimedia, (471-480)
  636. Engel P and Heinen M Incremental learning of multivariate Gaussian mixture models Proceedings of the 20th Brazilian conference on Advances in artificial intelligence, (82-91)
  637. Zhang X and Dou W Preference-aware QoS evaluation for cloud web service composition based on artificial neural networks Proceedings of the 2010 international conference on Web information systems and mining, (410-417)
  638. Xia Y, Wang G, Zhang X, Kim G and Bae H Research of spatio-temporal similarity measure on network constrained trajectory data Proceedings of the 5th international conference on Rough set and knowledge technology, (491-498)
  639. da Silva T and Silveira M Validação de um método para identificação de problemas de usabilidade a partir de diagramas UML Proceedings of the IX Symposium on Human Factors in Computing Systems, (179-188)
  640. Shukai L, Chaudhari N and Dash M (2010). Selecting useful features for personal credit risk analysis, International Journal of Business Information Systems, 6:4, (530-546), Online publication date: 1-Oct-2010.
  641. Carmona C, González P, del Jesus M and Herrera F (2010). NMEEF-SD, IEEE Transactions on Fuzzy Systems, 18:5, (958-970), Online publication date: 1-Oct-2010.
  642. Magnani M and Montesi D Uncertainty in decision tree classifiers Proceedings of the 4th international conference on Scalable uncertainty management, (250-263)
  643. Sun Y, Zhang C, Pang J, Alcade B and Mauw S A trust-augmented voting scheme for collaborative privacy management Proceedings of the 6th international conference on Security and trust management, (132-146)
  644. ACM
    Kleisouris K, Firner B, Howard R, Zhang Y and Martin R Detecting intra-room mobility with signal strength descriptors Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, (71-80)
  645. Campan A and Cooper N On-the-fly hierarchies for numerical attributes in data anonymization Proceedings of the 7th VLDB conference on Secure data management, (13-25)
  646. Li P, Liu L, Gao D and Reiter M On challenges in evaluating malware clustering Proceedings of the 13th international conference on Recent advances in intrusion detection, (238-255)
  647. Heinen M and Engel P An incremental probabilistic neural network for regression and reinforcement learning tasks Proceedings of the 20th international conference on Artificial neural networks: Part II, (170-179)
  648. Bratosin C, Sidorova N and van der Aalst W Discovering process models with genetic algorithms using sampling Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I, (41-50)
  649. Folino F, Pizzuti C and Ventura M A comorbidity network approach to predict disease risk Proceedings of the First international conference on Information technology in bio- and medical informatics, (102-109)
  650. Cao X, Cong G and Jensen C (2010). Mining significant semantic locations from GPS data, Proceedings of the VLDB Endowment, 3:1-2, (1009-1020), Online publication date: 1-Sep-2010.
  651. Kianfar J and Edara P (2010). Optimizing freeway traffic sensor locations by clustering global-positioning-system-derived speed patterns, IEEE Transactions on Intelligent Transportation Systems, 11:3, (738-747), Online publication date: 1-Sep-2010.
  652. Machado K, Winck A, Ruiz D and de Souza O Discretization of flexible-eceptor docking data Proceedings of the Advances in bioinformatics and computational biology, and 5th Brazilian conference on Bioinformatics, (75-79)
  653. Podpečan V, Grčar M and Lavrač N Semi-supervised constrained clustering Proceedings of the 11th Pacific Rim international conference on Trends in artificial intelligence, (219-230)
  654. Dazeley R, Yearwood J, Kang B and Kelarev A Consensus clustering and supervised classification for profiling phishing emails in internet commerce security Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services, (235-246)
  655. Ryu J, Kim W, Jeong J and Kim U Mining reputation of person/product from comment and reply on UCC/internet article Proceedings of the 6th international conference on Advanced intelligent computing theories and applications: intelligent computing, (354-361)
  656. Dellepiane S, Angiati E and Minetti I Multi-seed segmentation of tomographic volumes based on fuzzy connectedness Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing, (360-367)
  657. ACM
    Hailpern J, Jitkoff N, Subida J and Karahalios K The CLOTHO project Proceedings of the 8th ACM Conference on Designing Interactive Systems, (330-339)
  658. Tango F, Botta M, Minin L and Montanari R Non-intrusive Detection of Driver Distraction using Machine Learning Algorithms Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, (157-162)
  659. Deshmukh S, Mehrotra S and Singh H Using the normalization for typographic errors in numerals Proceedings of the Second international conference on Data Engineering and Management, (93-95)
  660. ACM
    Tang L, Wang X, Liu H and Wang L A multi-resolution approach to learning with overlapping communities Proceedings of the First Workshop on Social Media Analytics, (14-22)
  661. ACM
    Sun L, Cheng R, Cheung D and Cheng J Mining uncertain data with probabilistic guarantees Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (273-282)
  662. ACM
    Zheng L, Shen C, Tang L, Li T, Luis S, Chen S and Hristidis V Using data mining techniques to address critical information exchange needs in disaster affected public-private networks Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (125-134)
  663. Parshutin S Managing product life cycle with multiagent data mining system Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (308-322)
  664. Chaimontree S, Atkinson K and Coenen F Multi-agent based clustering Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects, (115-127)
  665. ACM
    Carbin M and Rinard M Automatically identifying critical input regions and code in applications Proceedings of the 19th international symposium on Software testing and analysis, (37-48)
  666. Sun L, Versteeg S, Boztaş S and Yann T Pattern recognition techniques for the classification of malware packers Proceedings of the 15th Australasian conference on Information security and privacy, (370-390)
  667. Barakat N, Bradley A and Barakat M (2010). Intelligible support vector machines for diagnosis of diabetes mellitus, IEEE Transactions on Information Technology in Biomedicine, 14:4, (1114-1120), Online publication date: 1-Jul-2010.
  668. Hirano S and Tsumoto S Representation of granularity for non-Euclidian relational data by Jaccard coefficients and binary classifications Proceedings of the 7th international conference on Rough sets and current trends in computing, (721-729)
  669. Koh Y, Pears R and Yeap W Valency based weighted association rule mining Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I, (274-285)
  670. ACM
    Huang L and Xu Q Performance yield-driven task allocation and scheduling for MPSoCs under process variation Proceedings of the 47th Design Automation Conference, (326-331)
  671. ACM
    Mahmoud H and Aboulnaga A Schema clustering and retrieval for multi-domain pay-as-you-go data integration systems Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, (411-422)
  672. Winck A, Machado K, Ruiz D and de Lima V Association rules to identify receptor and ligand structures through named entities recognition Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (119-128)
  673. Ros P and Pasero E Design and evaluation of neural networks for an embedded application Proceedings of the 23rd international conference on Industrial engineering and other applications of applied intelligent systems - Volume Part III, (11-20)
  674. ACM
    Johansson S and Johansson J (2010). Visual analysis of mixed data sets using interactive quantification, ACM SIGKDD Explorations Newsletter, 11:2, (29-38), Online publication date: 27-May-2010.
  675. Chaimontree S, Atkinson K and Coenen F Clustering in a multi-agent data mining environment Proceedings of the 6th international conference on Agents and data mining interaction, (103-114)
  676. Zhang Y, Meratnia N and Havinga P (2010). Ensuring high sensor data quality through use of online outlier detection techniques, International Journal of Sensor Networks, 7:3, (141-151), Online publication date: 1-May-2010.
  677. Su Q, Shao P and Zou T (2010). CRBT customer churn prediction: can data mining techniques work?, International Journal of Networking and Virtual Organisations, 7:4, (353-365), Online publication date: 1-May-2010.
  678. Karaolis M, Moutiris J, Hadjipanayi D and Pattichis C (2010). Assessment of the risk factors of coronary heart events based on data mining with decision trees, IEEE Transactions on Information Technology in Biomedicine, 14:3, (559-566), Online publication date: 1-May-2010.
  679. García S, Fernández A, Luengo J and Herrera F (2010). Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining, Information Sciences: an International Journal, 180:10, (2044-2064), Online publication date: 1-May-2010.
  680. ACM
    Katipally R, Gasior W, Cui X and Yang L Multistage attack detection system for network administrators using data mining Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  681. ACM
    Dasireddy S, Gasior W, Cui X and Yang L Alerts visualization and clustering in network-based intrusion detection Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  682. ACM
    Soares C, Williams P, Gilbert J and Dozier G A class-specific ensemble feature selection approach for classification problems Proceedings of the 48th Annual Southeast Regional Conference, (1-6)
  683. Yongqing Z, Qing K and Guoqing D A graphical method for reference reconciliation Proceedings of the 15th international conference on Database systems for advanced applications, (156-167)
  684. Engle K and Gangopadhyay A (2010). An Efficient Method for Discretizing Continuous Attributes, International Journal of Data Warehousing and Mining, 6:2, (1-21), Online publication date: 1-Apr-2010.
  685. Petry F and Yager R (2010). A framework for use of imprecise categorization in developing intelligent systems, IEEE Transactions on Fuzzy Systems, 18:2, (348-361), Online publication date: 1-Apr-2010.
  686. Huang P and Lai Y (2010). Effective segmentation and classification for HCC biopsy images, Pattern Recognition, 43:4, (1550-1563), Online publication date: 1-Apr-2010.
  687. Wu D, Ke Y, Yu J, Yu P and Chen L Detecting leaders from correlated time series Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I, (352-367)
  688. ACM
    Das Sarma A, Parameswaran A, Garcia-Molina H and Widom J Synthesizing view definitions from data Proceedings of the 13th International Conference on Database Theory, (89-103)
  689. ACM
    Barros R, Basgalupp M, Ruiz D, de Carvalho A and Freitas A Evolutionary model tree induction Proceedings of the 2010 ACM Symposium on Applied Computing, (1131-1137)
  690. Yang J, Ge Y, Xiong H, Chen Y and Liu H Performing joint learning for passive intrusion detection in pervasive wireless environments Proceedings of the 29th conference on Information communications, (767-775)
  691. ACM
    Mekkat V, Natarajan R, Hsu W and Zhai A Performance characterization of data mining benchmarks Proceedings of the 2010 Workshop on Interaction between Compilers and Computer Architecture, (1-8)
  692. Espejo P, Ventura S and Herrera F (2010). A survey on the application of genetic programming to classification, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 40:2, (121-144), Online publication date: 1-Mar-2010.
  693. Radovanović M, Nanopoulos A and Ivanović M (2010). Hubs in Space: Popular Nearest Neighbors in High-Dimensional Data, The Journal of Machine Learning Research, 11, (2487-2531), Online publication date: 1-Mar-2010.
  694. Winters-Hilt S and Baribault C (2010). A metastate HMM with application to gene structure identification in eukaryotes, EURASIP Journal on Advances in Signal Processing, 2010, (1-18), Online publication date: 1-Mar-2010.
  695. Koufakou A and Georgiopoulos M (2010). A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes, Data Mining and Knowledge Discovery, 20:2, (259-289), Online publication date: 1-Mar-2010.
  696. Wu J, Xiong H and Chen J (2010). COG, Data Mining and Knowledge Discovery, 20:2, (191-220), Online publication date: 1-Mar-2010.
  697. Sug H An effective sampling scheme for better multi-layer perceptrons Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (302-306)
  698. Lee B Missing data imputation based on unsupervised simple competitive learning Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (292-295)
  699. Romei A and Turini F (2010). XML data mining, Software—Practice & Experience, 40:2, (101-130), Online publication date: 1-Feb-2010.
  700. Yager R (2010). Norms induced from OWA operators, IEEE Transactions on Fuzzy Systems, 18:1, (57-66), Online publication date: 1-Feb-2010.
  701. Pan Q, Cheng H, Wu D, Yu J and Ke Y Stock risk mining by news Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104, (179-188)
  702. Freitas A, Wieser D and Apweiler R (2010). On the Importance of Comprehensible Classification Models for Protein Function Prediction, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 7:1, (172-182), Online publication date: 1-Jan-2010.
  703. Geng X, Hu G and Tian X (2010). Neural spike sorting using mathematical morphology, multiwavelets transform and hierarchical clustering, Neurocomputing, 73:4-6, (707-715), Online publication date: 1-Jan-2010.
  704. Berendt B, Krause B and Kolbe-Nusser S (2010). Intelligent scientific authoring tools, Information Processing and Management: an International Journal, 46:1, (1-10), Online publication date: 1-Jan-2010.
  705. Palshikar G, Deshpande S and Bhat S QUEST Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (83-91)
  706. Kaosar M, Xu Z and Yi X Distributed association rule mining with minimum communication overhead Proceedings of the Eighth Australasian Data Mining Conference - Volume 101, (17-23)
  707. Guo L and Wu X (2009). Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters, Transactions on Data Privacy, 2:3, (185-205), Online publication date: 1-Dec-2009.
  708. Heo H, Park H, Kim N and Lee J (2009). Prediction of credit delinquents using locally transductive multi-layer perceptron, Neurocomputing, 73:1-3, (169-175), Online publication date: 1-Dec-2009.
  709. ACM
    Sug H An empirical improvement of the accuracy of RBF networks Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, (708-712)
  710. Debruyne C, Leenheer P and Meersman R A Method and Tool for Fact Type Reuse in the DOGMA Ontology Framework Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II, (1147-1164)
  711. ACM
    Shirani-Mehr H, Banaei-Kashani F and Shahabi C Efficient viewpoint assignment for urban texture documentation Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (62-71)
  712. ACM
    Trestian I, Ranjan S, Kuzmanovic A and Nucci A Measuring serendipity Proceedings of the 9th ACM SIGCOMM conference on Internet measurement, (267-279)
  713. Nanopoulos A, Gabriel H and Spiliopoulou M Spectral Clustering in Social-Tagging Systems Proceedings of the 10th International Conference on Web Information Systems Engineering, (87-100)
  714. Rosa M, Gaglio S, Rizzo R and Urso A (2009). Normalised compression distance and evolutionary distance of genomic sequences: comparison of clustering results, International Journal of Knowledge Engineering and Soft Data Paradigms, 1:4, (345-362), Online publication date: 1-Oct-2009.
  715. Chen L, Bhowmick S and Nejdl W (2009). COWES, Data & Knowledge Engineering, 68:10, (867-885), Online publication date: 1-Oct-2009.
  716. Sug H (2009). Empirical determination of sample sizes for multi-layer perceptrons by simple RBF networks, WSEAS Transactions on Computers, 8:9, (1504-1513), Online publication date: 1-Sep-2009.
  717. ACM
    Kulkarni M, Pingali K, Walter B, Ramanarayanan G, Bala K and Chew L (2009). Optimistic parallelism requires abstractions, Communications of the ACM, 52:9, (89-97), Online publication date: 1-Sep-2009.
  718. Batina L, Gierlichs B and Lemke-Rust K Differential Cluster Analysis Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, (112-127)
  719. ACM
    Sug H Sampling scheme for better RBF network Proceedings of the 2009 International Conference on Hybrid Information Technology, (413-416)
  720. Xia F, Jicun T and Zhihui L A text categorization method based on local document frequency Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7, (468-471)
  721. Ye Q, Wu B, Hu D and Wang B Exploring temporal egocentric networks in mobile call graphs Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 2, (413-417)
  722. Zhang L, Qiao M and Zhang D Research on multi-dimensional association rules mining in distributed environments based on advanced SQL query Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 2, (108-112)
  723. Seliya N, Khoshgoftaar T and Van Hulse J Aggregating performance metrics for classifier evaluation Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (35-40)
  724. Chen L, Bhowmick S and Nejdl W (2009). NEAR-Miner, Proceedings of the VLDB Endowment, 2:1, (1150-1161), Online publication date: 1-Aug-2009.
  725. Yang F, Sun T and Zhang C (2009). An efficient hybrid data clustering method based on K-harmonic means and Particle Swarm Optimization, Expert Systems with Applications: An International Journal, 36:6, (9847-9852), Online publication date: 1-Aug-2009.
  726. Sug H A pilot sampling method for multi-layer perceptrons Proceedings of the WSEAES 13th international conference on Computers, (629-633)
  727. Kang H, Yoo S and Han D Accessing Positive and Negative Online Opinions Proceedings of the 5th International Conference on Universal Access in Human-Computer Interaction. Part III: Applications and Services, (359-368)
  728. Chen Y A Fast Approximation Algorithm for the k Partition-Distance Problem Proceedings of the International Conference on Computational Science and Its Applications: Part II, (537-546)
  729. ACM
    Chandola V, Banerjee A and Kumar V (2009). Anomaly detection, ACM Computing Surveys, 41:3, (1-58), Online publication date: 1-Jul-2009.
  730. ACM
    Tran Q, Chan C and Parthasarathy S Query by output Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, (535-548)
  731. ACM
    Kirsch A, Mitzenmacher M, Pietracaprina A, Pucci G, Upfal E and Vandin F An efficient rigorous approach for identifying statistically significant frequent itemsets Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (117-126)
  732. ACM
    Naïja Y and Sinaoui K A novel measure for validating clustering results applied to road traffic Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data, (105-113)
  733. ACM
    Johansson S Visual exploration of categorical and mixed data sets Proceedings of the ACM SIGKDD Workshop on Visual Analytics and Knowledge Discovery: Integrating Automated Analysis with Interactive Exploration, (21-29)
  734. ACM
    Wang X, Chakrabarti D and Punera K Mining broad latent query aspects from search sessions Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (867-876)
  735. ACM
    Ge Y, Xiong H, Zhou W, Sahoo R, Gao X and Wu W Multi-focal learning and its application to customer service support Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, (349-358)
  736. ACM
    Lymberopoulos D, Bamis A and Savvides A A methodology for extracting temporal properties from sensor network data streams Proceedings of the 7th international conference on Mobile systems, applications, and services, (193-206)
  737. Ahmed I, Lhee K, Shin H and Hong M On Improving the Accuracy and Performance of Content-Based File Type Identification Proceedings of the 14th Australasian Conference on Information Security and Privacy, (44-59)
  738. ACM
    Torres R, Hajjat M, Rao S, Mellia M and Munafo M (2009). Inferring undesirable behavior from P2P traffic analysis, ACM SIGMETRICS Performance Evaluation Review, 37:1, (25-36), Online publication date: 15-Jun-2009.
  739. ACM
    Torres R, Hajjat M, Rao S, Mellia M and Munafo M Inferring undesirable behavior from P2P traffic analysis Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems, (25-36)
  740. ACM
    Radovanović M, Nanopoulos A and Ivanović M Nearest neighbors in high-dimensional data Proceedings of the 26th Annual International Conference on Machine Learning, (865-872)
  741. ACM
    Pedreschi D, Ruggieri S and Turini F Integrating induction and deduction for finding evidence of discrimination Proceedings of the 12th International Conference on Artificial Intelligence and Law, (157-166)
  742. Zhu L, Chung F and Wang S (2009). Generalized fuzzy C-means clustering algorithm with improved fuzzy partitions, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:3, (578-591), Online publication date: 1-Jun-2009.
  743. Wu J, Xiong H and Chen J (2009). Towards understanding hierarchical clustering, Neurocomputing, 72:10-12, (2319-2330), Online publication date: 1-Jun-2009.
  744. Becerra D, Vanegas D, Cantor G and Niño L An association rule based approach for biological sequence feature classification Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3111-3118)
  745. Golzari S, Doraisamy S, Sulaiman M and Udzir N Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase Proceedings of the Eleventh conference on Congress on Evolutionary Computation, (3040-3044)
  746. ACM
    Mende T and Koschke R Revisiting the evaluation of defect prediction models Proceedings of the 5th International Conference on Predictor Models in Software Engineering, (1-10)
  747. Barker A, van Hemert J, Baldock R and Atkinson M An E-infrastructure to Support Collaborative Embryo Research Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, (520-525)
  748. Yu L (2009). Feature cluster selection for high-throughput data analysis, International Journal of Data Mining and Bioinformatics, 3:2, (177-191), Online publication date: 1-May-2009.
  749. ACM
    Wolters M, Georgila K, Moore J and MacPherson S (2009). Being Old Doesn’t Mean Acting Old, ACM Transactions on Accessible Computing, 2:1, (1-39), Online publication date: 1-May-2009.
  750. François T Combining a statistical language model with logistic regression to predict the lexical and syntactic difficulty of texts for FFL Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics: Student Research Workshop, (19-27)
  751. Sug H (2009). An effective sampling method for decision trees considering comprehensibility and accuracy, WSEAS Transactions on Computers, 8:4, (631-640), Online publication date: 1-Apr-2009.
  752. ACM
    Angiulli F, Fassetti F and Palopoli L (2009). Detecting outlying properties of exceptional objects, ACM Transactions on Database Systems, 34:1, (1-62), Online publication date: 1-Apr-2009.
  753. Xiong H, Wu J and Chen J (2009). K-means clustering versus validation measures, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 39:2, (318-331), Online publication date: 1-Apr-2009.
  754. Taft L, Evans R, Shyu C, Egger M, Chawla N, Mitchell J, Thornton S, Bray B and Varner M (2009). Countering imbalanced datasets to improve adverse drug event predictive models in labor and delivery, Journal of Biomedical Informatics, 42:2, (356-364), Online publication date: 1-Apr-2009.
  755. Pendharkar P (2009). Genetic algorithm based neural network approaches for predicting churn in cellular wireless network services, Expert Systems with Applications: An International Journal, 36:3, (6714-6720), Online publication date: 1-Apr-2009.
  756. ACM
    Trajcevski G, Tamassia R, Ding H, Scheuermann P and Cruz I Continuous probabilistic nearest-neighbor queries for uncertain trajectories Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, (874-885)
  757. ACM
    Villamarín-Salomón R and Brustoloni J Bayesian bot detection based on DNS traffic similarity Proceedings of the 2009 ACM symposium on Applied Computing, (2035-2041)
  758. ACM
    Basgalupp M, Barros R, de Carvalho A, Freitas A and Ruiz D LEGAL-tree Proceedings of the 2009 ACM symposium on Applied Computing, (1085-1090)
  759. Mende T, Koschke R and Beckwermert F (2009). An evaluation of code similarity identification for the grow-and-prune model, Journal of Software Maintenance and Evolution: Research and Practice, 21:2, (143-169), Online publication date: 1-Mar-2009.
  760. ACM
    Kriegel H, Kröger P and Zimek A (2009). Clustering high-dimensional data, ACM Transactions on Knowledge Discovery from Data, 3:1, (1-58), Online publication date: 1-Mar-2009.
  761. Sug H An empirical determination of samples for decision trees Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases, (413-416)
  762. ACM
    Li L, Lee F, Chen Y and Cheng C A multi-stage collaborative filtering approach for mobile recommendation Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (88-97)
  763. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C (2009). How much parallelism is there in irregular applications?, ACM SIGPLAN Notices, 44:4, (3-14), Online publication date: 14-Feb-2009.
  764. ACM
    Kulkarni M, Burtscher M, Inkulu R, Pingali K and Casçaval C How much parallelism is there in irregular applications? Proceedings of the 14th ACM SIGPLAN symposium on Principles and practice of parallel programming, (3-14)
  765. Song Z and Kusiak A (2009). Optimization of temporal processes, IEEE Transactions on Evolutionary Computation, 13:1, (169-179), Online publication date: 1-Feb-2009.
  766. Exarchos K, Papaloukas C, Exarchos T, Troganis A and Fotiadis D (2009). Prediction of cis/trans isomerization using feature selection and support vector machines, Journal of Biomedical Informatics, 42:1, (140-149), Online publication date: 1-Feb-2009.
  767. Dassow J, Martín G and Vico F (2009). A Similarity Measure for Cyclic Unary Regular Languages, Fundamenta Informaticae, 96:1-2, (71-88), Online publication date: 1-Jan-2009.
  768. Basgalupp M, Carvalho A, Barros R, Ruiz D and Freitas A (2009). Lexicographic multi-objective evolutionary induction of decision trees, International Journal of Bio-Inspired Computation, 1:1/2, (105-117), Online publication date: 1-Jan-2009.
  769. Saitta S, Raphael B and Smith I (2008). A comprehensive validity index for clustering, Intelligent Data Analysis, 12:6, (529-548), Online publication date: 30-Dec-2009.
  770. Chen F, Scripps J and Tan P Link Mining for a Social Bookmarking Web Site Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, (169-175)
  771. ACM
    Menemenis F, Papadopoulos S, Bratu B, Waddington S and Kompatsiaris Y AQUAM Proceedings of the 7th International Conference on Mobile and Ubiquitous Multimedia, (32-39)
  772. Al-Oqaily A, Kennedy P, Catchpoole D and Simoff S Comparison of visualization methods of genome-wide SNP profiles in childhood acute lymphoblastic leukaemia Proceedings of the 7th Australasian Data Mining Conference - Volume 87, (111-121)
  773. ACM
    Machdi I, Amagasa T and Kitagawa H GMX Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (137-146)
  774. Das A, Ozisikyilmaz B, Ozdemir S, Memik G, Zambreno J and Choudhary A Evaluating the effects of cache redundancy on profit Proceedings of the 41st annual IEEE/ACM International Symposium on Microarchitecture, (388-398)
  775. ACM
    Hu M, Sun A and Lim E Event detection with common user interests Proceedings of the 10th ACM workshop on Web information and data management, (1-8)
  776. ACM
    Akbar M and Angryk R Frequent pattern-growth approach for document organization Proceedings of the 2nd international workshop on Ontologies and information systems for the semantic web, (77-82)
  777. Kang Y and Hwang S Rough concept analysis for rough classification Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems, (137-142)
  778. ACM
    da Cruz J and Ruiz D Uma experiência em mineração de processos de manutenção de software Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web, (247-253)
  779. ACM
    Macdonald C and Ounis I Key blog distillation Proceedings of the 17th ACM conference on Information and knowledge management, (1043-1052)
  780. da Silva T and Silveira M Antecipando a avaliação de IHC Proceedings of the VIII Brazilian Symposium on Human Factors in Computing Systems, (248-251)
  781. ACM
    Kalathur S Enriching student experience with student driven content while teaching an online data mining class Proceedings of the 9th ACM SIGITE conference on Information technology education, (125-130)
  782. dos Santos J, Heuser C, Orengo V and Wives L Automatic threshold estimation for data matching applications Proceedings of the 23rd Brazilian symposium on Databases, (106-119)
  783. Iyigun C and Ben-israel A (2008). Probabilistic distance clustering adjusted for cluster size, Probability in the Engineering and Informational Sciences, 22:4, (603-621), Online publication date: 1-Oct-2008.
  784. ACM
    Quercia D, Hailes S and Capra L MobiRate Proceedings of the 10th international conference on Ubiquitous computing, (212-221)
  785. Le M and Ong Y A Frequent Pattern Mining Algorithm for Understanding Genetic Algorithms Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (131-139)
  786. Lawson M, Heath L, Ramakrishnan N and Zhang L Using Cost-Sensitive Learning to Determine Gene Conversions Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (1030-1038)
  787. Kontaki M, Papadopoulos A and Manolopoulos Y Continuous Trend-Based Clustering in Data Streams Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery, (251-262)
  788. ACM
    Staddon J Sponsored ad-based similarity Proceedings of the 2nd International Workshop on Data Mining and Audience Intelligence for Advertising, (50-56)
  789. ACM
    Gupta R, Fang G, Field B, Steinbach M and Kumar V Quantitative evaluation of approximate frequent pattern mining algorithms Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (301-309)
  790. ACM
    Bonchi F, Castillo C, Donato D and Gionis A Topical query decomposition Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (52-60)
  791. Abdelzaher T, Khan M, Le H, Ahmadi H and Han J Data mining for diagnostic debugging in sensor networks Proceedings of the Second international conference on Knowledge Discovery from Sensor Data, (1-24)
  792. ACM
    Kokku R, Sundaresan K and Jiang G Enabling location specific real-time mobile applications Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture, (19-24)
  793. Ding H, Trajcevski G, Scheuermann P, Wang X and Keogh E (2008). Querying and mining of time series data, Proceedings of the VLDB Endowment, 1:2, (1542-1552), Online publication date: 1-Aug-2008.
  794. Dey A, Bhaumik S, D H and Haritsa J (2008). Efficiently approximating query optimizer plan diagrams, Proceedings of the VLDB Endowment, 1:2, (1325-1336), Online publication date: 1-Aug-2008.
  795. Craus M and Archip A A generalized parallel algorithm for frequent itemset mining Proceedings of the 12th WSEAS international conference on Computers, (520-523)
  796. ACM
    Lymberopoulos D, Bamis A and Savvides A Extracting spatiotemporal human activity patterns in assisted living using a home sensor network Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments, (1-8)
  797. ACM
    Hariharan R, Hore B and Mehrotra S Discovering gis sources on the web using summaries Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries, (94-103)
  798. ACM
    Ozisikyilmaz B, Memik G and Choudhary A Efficient system design space exploration using machine learning techniques Proceedings of the 45th annual Design Automation Conference, (966-969)
  799. Garriga G, Kralj P and Lavrač N (2008). Closed Sets for Labeled Data, The Journal of Machine Learning Research, 9, (559-580), Online publication date: 1-Jun-2008.
  800. ACM
    Kulkarni M, Carribault P, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L Scheduling strategies for optimistic parallel execution of irregular programs Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures, (217-228)
  801. Tsai C and Chiu C (2008). Developing a feature weight self-adjustment mechanism for a K-means clustering algorithm, Computational Statistics & Data Analysis, 52:10, (4658-4672), Online publication date: 1-Jun-2008.
  802. ACM
    Yilmaz C, Paradkar A and Williams C Time will tell Proceedings of the 30th international conference on Software engineering, (81-90)
  803. ACM
    Miaskiewicz T, Sumner T and Kozar K A latent semantic analysis methodology for the identification and creation of personas Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1501-1510)
  804. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGPLAN Notices, 43:3, (233-243), Online publication date: 25-Mar-2008.
  805. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGOPS Operating Systems Review, 42:2, (233-243), Online publication date: 25-Mar-2008.
  806. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L (2008). Optimistic parallelism benefits from data partitioning, ACM SIGARCH Computer Architecture News, 36:1, (233-243), Online publication date: 25-Mar-2008.
  807. Calders T (2008). Itemset frequency satisfiability, Theoretical Computer Science, 394:1-2, (84-111), Online publication date: 20-Mar-2008.
  808. ACM
    Mengle S, Goharian N and Platt A Discovering relationships among categories using misclassification information Proceedings of the 2008 ACM symposium on Applied computing, (932-937)
  809. ACM
    Rahal I Undergraduate research experiences in data mining Proceedings of the 39th SIGCSE technical symposium on Computer science education, (461-465)
  810. ACM
    Kulkarni M, Pingali K, Ramanarayanan G, Walter B, Bala K and Chew L Optimistic parallelism benefits from data partitioning Proceedings of the 13th international conference on Architectural support for programming languages and operating systems, (233-243)
  811. Secker A, Freitas A and Timmis J (2008). AISIID, Applied Soft Computing, 8:2, (885-905), Online publication date: 1-Mar-2008.
  812. ACM
    Rahal I (2008). Undergraduate research experiences in data mining, ACM SIGCSE Bulletin, 40:1, (461-465), Online publication date: 29-Feb-2008.
  813. Badawy S, Elragal A and Gabr M Multivariate similarity-based conformity measure (MSCM) Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (314-320)
  814. Bellandi A, Furletti B, Grossi V and Romei A Ontological support for Association Rule Mining Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (110-115)
  815. ACM
    Kim H, Hwang J, Suh B, Nah Y and Mok H Semi-automatic ontology construction for visual media web service Proceedings of the 2nd international conference on Ubiquitous information management and communication, (69-73)
  816. Naud A and Usui S Exploration of a text collection and identification of topics by clustering Proceedings of the 8th international conference on Intelligent data engineering and automated learning, (115-124)
  817. Sebastião R and Gama J Change detection in learning histograms from data streams Proceedings of the aritficial intelligence 13th Portuguese conference on Progress in artificial intelligence, (112-123)
  818. Ghodke S and Baldwin T An investigation into the interaction between feature selection and discretization Proceedings of the 20th Australian joint conference on Advances in artificial intelligence, (48-57)
  819. ACM
    Urruty T, Lew S, Ihadaddene N and Simovici D (2007). Detecting eye fixations by projection clustering, ACM Transactions on Multimedia Computing, Communications, and Applications, 3:4, (1-20), Online publication date: 1-Dec-2007.
  820. Sun Y, Kamel M, Wong A and Wang Y (2007). Cost-sensitive boosting for classification of imbalanced data, Pattern Recognition, 40:12, (3358-3378), Online publication date: 1-Dec-2007.
  821. ACM
    Gao Q, Qin F and Panda D DMTracker Proceedings of the 2007 ACM/IEEE conference on Supercomputing, (1-12)
  822. ACM
    Zage D and Nita-Rotaru C On the accuracy of decentralized virtual coordinate systems in adversarial networks Proceedings of the 14th ACM conference on Computer and communications security, (214-224)
  823. Haralick R and Harpaz R (2007). Linear manifold clustering in high dimensional spaces by stochastic search, Pattern Recognition, 40:10, (2672-2684), Online publication date: 1-Oct-2007.
  824. Wang M, Hsu P, Lin K and Chen S Clustering transactions with an unbalanced hierarchical product structure Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery, (251-361)
  825. Choo J, Jiamthapthaksin R, Chen C, Celepcikay O, Giusti C and Eick C MOSAIC Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery, (231-240)
  826. Ma K (2007). Machine Learning to Boost the Next Generation of Visualization Technology, IEEE Computer Graphics and Applications, 27:5, (6-9), Online publication date: 1-Sep-2007.
  827. Tsai C and Chiu C An efficient feature selection approach for clustering Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I, (1107-1118)
  828. ACM
    Ye Y, Wang D, Li T and Ye D IMDS Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (1043-1047)
  829. ACM
    Wu J, Xiong H, Wu P and Chen J Local decomposition for rare class analysis Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (814-823)
  830. ACM
    Pandey G, Steinbach M, Gupta R, Garg T and Kumar V Association analysis-based transformations for protein interaction networks Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, (540-549)
  831. Steinbach M and Kumar V (2007). Generalizing the notion of confidence, Knowledge and Information Systems, 12:3, (279-299), Online publication date: 3-Aug-2007.
  832. Chandola V and Kumar V (2007). Summarization – compressing data into an informative representation, Knowledge and Information Systems, 12:3, (355-378), Online publication date: 3-Aug-2007.
  833. Behal A, Chen Y, Kieliszewski C, Lelescu A, He B, Cui J, Kreulen J, Rhodes J and Spangler W Business insights workbench Proceedings of the 2007 conference on Human interface: Part II, (834-843)
  834. Urruty T, Djeraba C and Simovici D Clustering by random projections Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications, (107-119)
  835. Liu Y and Salvendy G Interactive visual decision tree classification Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques, (92-105)
  836. Bistarelli S and Bonchi F (2007). Soft constraint based pattern mining, Data & Knowledge Engineering, 62:1, (118-137), Online publication date: 1-Jul-2007.
  837. Stassopoulou A and Dikaiakos M A probabilistic reasoning approach for discovering web crawler sessions Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management, (265-272)
  838. ACM
    Kulkarni M, Pingali K, Walter B, Ramanarayanan G, Bala K and Chew L Optimistic parallelism requires abstractions Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, (211-222)
  839. ACM
    Erman J, Mahanti A and Arlitt M Byte me Proceedings of the 3rd annual ACM workshop on Mining network data, (35-38)
  840. ACM
    Kulkarni M, Pingali K, Walter B, Ramanarayanan G, Bala K and Chew L (2007). Optimistic parallelism requires abstractions, ACM SIGPLAN Notices, 42:6, (211-222), Online publication date: 10-Jun-2007.
  841. Stuart K and Majewski M Selected Problems of Knowledge Discovery Using Artificial Neural Networks Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III, (1049-1057)
  842. Neumayer R and Rauber A Multi-modal music information retrieval Large Scale Semantic Access to Content (Text, Image, Video, and Sound), (70-89)
  843. Lee T, Park J and In H Effective appliance selection by complementary context feeding in smart home system Proceedings of the 5th IFIP WG 10.2 international conference on Software technologies for embedded and ubiquitous systems, (233-242)
  844. Sarkar P, Routray R, Butler E, Tan C, Voruganti K and Yang K SPIKE Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques, (1-6)
  845. Kasten E and McKinley P (2007). MESO, IEEE Transactions on Knowledge and Data Engineering, 19:4, (485-499), Online publication date: 1-Apr-2007.
  846. ACM
    Achananuparp P, Han H, Nasraoui O and Johnson R Semantically enhanced user modeling Proceedings of the 2007 ACM symposium on Applied computing, (1335-1339)
  847. ACM
    Mansmann S and Scholl M Exploring OLAP aggregates with hierarchical visualization techniques Proceedings of the 2007 ACM symposium on Applied computing, (1067-1073)
  848. Cao F, Delon J, Desolneux A, Musé P and Sur F (2007). A Unified Framework for Detecting Groups and Application to Shape Recognition, Journal of Mathematical Imaging and Vision, 27:2, (91-119), Online publication date: 1-Feb-2007.
  849. Tan H and Ngo C Mining multiple visual appearances of semantics for image annotation Proceedings of the 13th international conference on Multimedia Modeling - Volume Part I, (269-278)
  850. Bistarelli S and Bonchi F Extending the soft constraint based mining paradigm Proceedings of the 5th international conference on Knowledge discovery in inductive databases, (24-41)
  851. Ellis C, Rembert A, Kim K and Wainer J Beyond workflow mining Proceedings of the 4th international conference on Business Process Management, (49-64)
  852. Yin X, Han J and Yu P LinkClus Proceedings of the 32nd international conference on Very large data bases, (427-438)
  853. ACM
    Xiong H, Wu J and Chen J K-means clustering versus validation measures Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (779-784)
  854. ACM
    Arunasalam B and Chawla S CCCS Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, (517-522)
  855. Liu P, Wu N, Zhu J, Yin J and Zhang W A unified strategy of feature selection Proceedings of the Second international conference on Advanced Data Mining and Applications, (457-464)
  856. Saitta S, Raphael B and Smith I Combining two data mining methods for system identification Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture, (606-614)
  857. Câmpan A and Şerban G Adaptive clustering algorithms Proceedings of the 19th international conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, (407-418)
  858. Simovici D and Jaroszewicz S Generalized conditional entropy and a metric splitting criterion for decision trees Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, (35-44)
  859. ACM
    Musicant D (2006). A data mining course for computer science, ACM SIGCSE Bulletin, 38:1, (538-542), Online publication date: 31-Mar-2006.
  860. Neven F and Van de Craen D Optimizing monitoring queries over distributed data Proceedings of the 10th international conference on Advances in Database Technology, (829-846)
  861. Vinnik S and Mansmann F From analysis to interactive exploration Proceedings of the 10th international conference on Advances in Database Technology, (496-514)
  862. ACM
    Musicant D A data mining course for computer science Proceedings of the 37th SIGCSE technical symposium on Computer science education, (538-542)
  863. Xiong H, Pandey G, Steinbach M and Kumar V (2006). Enhancing Data Analysis with Noise Removal, IEEE Transactions on Knowledge and Data Engineering, 18:3, (304-319), Online publication date: 1-Mar-2006.
  864. Yi H, de la Iglesia B and Rayward-Smith V Using concept taxonomies for effective tree induction Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II, (1011-1016)
  865. Steinbach M and Kumar V Generalizing the Notion of Confidence Proceedings of the Fifth IEEE International Conference on Data Mining, (402-409)
  866. Chandola V and Kumar V Summarization — Compressing Data into an Informative Representation Proceedings of the Fifth IEEE International Conference on Data Mining, (98-105)
  867. Ramadan E, Osgood C and Pothen A The architecture of a proteomic network in the yeast Proceedings of the First international conference on Computational Life Sciences, (265-276)
  868. Bounif H, Spaccapietra S and Pottinger R Requirements ontology and multi-representation strategy for database schema evolution Proceedings of the First and Second VLDB conference on Ontologies-based databases and information systems, (68-84)
  869. Vinayak R and Hassibi B Similarity clustering in the presence of outliers: Exact recovery via convex program 2016 IEEE International Symposium on Information Theory (ISIT), (91-95)
  870. Catalbas M, Yildirim M, Gulten A and Kurum H Optimal component selection for image segmentation via Parallel Analysis 2016 IEEE 8th International Conference on Intelligent Systems (IS), (499-502)
  871. Noughabi E, Far B and Raahemi B Predicting Students' Behavioral Patterns in University Networks for Efficient Bandwidth Allocation: A Hybrid Data Mining Method (Application Paper) 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (102-109)
  872. Forward Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014), (xiv-xiv)
  873. Liu X, Song H, Baldi M and Tan P Macro-scale mobile app market analysis using customized hierarchical categorization IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  874. Kuo R and Zulvia F Cluster analysis using a gradient evolution-based k-means algorithm 2016 IEEE Congress on Evolutionary Computation (CEC), (5138-5145)
  875. Miquilini P, Barros R, de Melo V and Basgalupp M Enhancing discrimination power with genetic feature construction: A grammatical evolution approach 2016 IEEE Congress on Evolutionary Computation (CEC), (3824-3831)
Contributors
  • Michigan State University
  • University of Minnesota Twin Cities
  • University of Minnesota Twin Cities

Recommendations

Reviews

Radu State

Data mining is the science of extracting meaningful knowledge and structures from large volumes of data. This process is an essential component in modern marketing, business decision support, medical research, and computer security related activities. I was pleasantly surprised to discover a book that is both scientifically comprehensive and easy to follow by a reader interested in finding solutions to concrete problems. While some data mining books are oriented heavily toward mathematical background, and strive to provide proofs about the correctness of the described methods, others cover only some tool-oriented methods, without describing the underlying theory. This book succeeds in striking the right balance. The key concepts and data mining methods are introduced and described thoroughly, with respect to both their applicability for some real-world applications and their mathematical background and nature. The authors start with an introduction to the objectives of data mining tasks, data collection, and analysis procedures (data processing and sampling, variable types, and so on), giving a broad overview of this discipline and its associated context. This part also includes a highly relevant hypothetical dialog between a data miner and a statistician, illustrating the key differences between these two related disciplines. The remainder of the book is divided into four conceptual parts. Data classification is addressed in two chapters. The first covers decision trees and their performance evaluation, while the second addresses some state-of-the-art classification methods based on neural networks, support vector machines, and Bayesian networks. The second part addresses the analysis of associations, which can be summarized as inferring relationships among multiple observed variables. This section starts with basic association detection, and ends with advanced issues like dealing with infrequent patterns, subgraph patterns, and timing constraints. One essential data mining task is the automatic clustering of data, such that an underlying structure can be highlighted. These clusters are composed of items that are close in terms of their characteristics. This issue is covered in two dedicated chapters, and this third part of the book is an excellent overview of existing data clustering methods: k-means, neural network based, minimum spanning tree based, and several others, just to name a few. Finally, anomaly detection is covered in the fourth part of the book. Anomaly detection is currently the major building block of modern intrusion detection and process control systems. As such, this chapter might be of major interest to readers working on such projects. The mathematical background, required to follow the text is limited to basic probabilities and linear algebra. For those readers wishing to refresh their background in optimization theory, linear algebra, statistics, and probability theory, several well-written appendices make for very enjoyable reading. I started reading this book searching for a solution to some network security related problems requiring a data mining process. Besides finding the conceptual solutions, I discovered a superb and thrilling book on data mining and structural knowledge extraction. I strongly recommend this book to all readers interested in data mining techniques and data analysis. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.